A sub in one hand and money in the other spells prosperity for the New Year....so says my mother in law.
It's around 9pm, EST, on December 31st....the eve of the new year is upon us and I'm sitting back in my "man cave" while my wife and niece are out in the living room watching some chick flick. I've been taking the time to reflect on the past year as I watch the Thin Man Marathon on TCM.
All in all, we've had a pretty great year. Blessed with a new home, fantastic neighborhood, a new vehicle, friends, family, and health, there's really nothing I have to complain about.
As great as 2015 has been, I'm having even higher expectations for 2016 and am looking forward to new personal bests as well as making some changes for the better in my life. Hopefully that also means more frequent updates to this poor, neglected, blog.
We'll see how it goes.
If you're out and about, stay safe and here's to a joyous and prosperous 2016 to you all.
Android Malware Uses Firewell Rules To Evade Detection From Antivirus
Researchers at Symantec have discovered a new piece of Android malware that drops and runs a firewall binary called DroidWall on compromised devices to prevent security applications from connecting to their services.
Dubbed Android.Spywaller by Symantec, the malware initially behaves like other mobile threats by hiding its icon in an attempt to cover its track and by releasing an encrypted payload containing the malware service logic and loading it into memory. As soon as the threat has been installed on a compromised device, it displays a “Google Service” icon on the device, although the Internet giant doesn’t offer such a product.
At the same time, the spyware is collecting data belonging to specific third-party communication applications, including
WhatsApp
Wechat
Skype
BlackBerry Messenger
Skype
Oovoo
Coco
QQ
SinaWeibo
Talkbox
TencentWeibo
Voxer
and Zello.
According to Symantec, the list of data gathered by this malware ranks it among the most comprehensive spyware to date.
The malware then attempts to root the device and start collecting sensitive information while running in the background. All of the information the malware collects from the device ,exfiltrate sensitive data from compromised devices and then sent to a backend server, Symantec explained in a recent blog post.
The Malware Collect the information including
Call logs(PII)
SMS
GPS readings
Browser History
Browser Saved PasswordE
Emails
Radio
Images
and contacts.
While this behavior has been seen before in mobile threats, Symantec’s researchers note that the new malware stands out because of another method discovered in its reverse payload which checks to see if the Qihoo 360 mobile security app is installed on the device and then block it.
The Qihoo 360 application is popular in China and has a unique identifier (UID) on each device, and the malware collects the identifier if the program is installed. Next, Android Spywaller drops and runs the DroidWall firewall binary, which is a customized version of iptables for Android. This allows it to create firewall rules that will block the targeted security application by referencing its UID.
Developed by Rodrigo Rosauro as an open source app to help users protect their devices, DroidWall was sold to AVAST in 2011, but its source code is still available from Google Code and Github. Although it was initially designed in the form of a security tool, DroidWall can be used by cybercriminals to compromise user security.
For the time being, the malware is targeted at users in China, where a higher proportion of devices are rooted and more exposed to malware since official Google services are not available in the country.
The infection numbers are currenty relatively low, but the threat is worth noting because its authors are using legitimate tools for malicious purposes. To stay protected, users should install a security solution that can block mobile threats, should keep their software updated at all times, and should make sure they install apps only from trusted sources.
According to Ormandy’s report, the Chrome extension, dubbed AVG Web TuneUp and featuring extension id chfdnecihphmhljaaejmgoiahnihplgn, is force-installed on the end-user systems along with the AVG AntiVirus application. The extension adds a series of vulnerabilities to the browser, thus putting its more than 9 million installed users at risk. The extension, which has over 9 million active users, contains a serious flaw that exposes users'
Browsing history
Cookies,
and Personal data
....to attackers.
“This extension adds numerous JavaScript API's to chrome, apparently so that they can hijack search settings and the new tab page,” wrote Ormandy in the bug report. “The installation process is quite complicated so that they can bypass the chrome malware checks, which specifically tries to stop abuse of the extension API.”
Among the vulnerabilities that AVG Web TuneUp brings along, the researcher mentions a “trivial universal” XSS (Cross-Site Scripting) in the "navigate" API, which could allow websites to execute scripts in the context of any other domains. According to Ormandy, a website could read emails from mail.google.com and perform other actions as well because of this high-severity flaw.
Ormandy was involved in the discovery of vulnerabilities in Kaspersky's anti-virus product in September and a critical vulnerability in FireEye network security devices earlier this month.
Ormandy wrote in a follow-up response to the bug report Monday, “I believe this issue is resolved now, but inline installations are disabled while the CWS team investigate possible policy violations.”
Mr. Jacob Yocom-Piatt, has funded Bitcoin development since early 2013, aforesaid the particular development of the Bitcoin cryptocurrency is funded by external entities that forms a conflict of interests between the teams and also the project's core developers. Few of Bitcoin’s Lead developers have left the Bitcoin project and began building their separate cryptocurrency known as DECRED.
Decred aims to stop the problems Bitcoin is presently facing relating to project governance and development funding.
According to Bitcoin's developers, these cluster puts limitations on input in Bitcoin's governance,choosing choices that square measure favorable to their own interests solely, and customarily ignoring the developers' and project's best interests.
"The Bitcoin is controlled by a tiny low cluster of individuals agency decide completely what will and can't be modified," Jacob says during a announcement.
"This is partly attributable to an absence of mechanisms and pathways for funding development work directly from the community, and, as a result, Bitcoin development is funded by external entities that make conflicts of interest between the developers and also the representative power of the community that uses Bitcoin."
So, as to handle this issue, a number of the Bitcoin developers have joined hands with the manufacturers of the wide used BTCsuite and square measure currently building their own new digital currency known as DECRED.
Decred has an Airdrop scheduled for next month where they’ll be giving out 4 percent of the total Decred supply to all participants.
British spies enlisted the help of the US National Security Agency (NSA) to learn how to hack firewalls made by top internet security provider Juniper, according to leaked documents.
Government Communications Headquarters (GCHQ), which is the UK’s foremost electronic intelligence and surveillance agency, looked to its counterpart across the Atlantic to access the firm’s firewalls.
The revelations come as the Intercept website released a six-page document dating back to 2011 titled “Assessment of Intelligence Opportunity – Juniper” that was written by an NSA employee working with GCHQ. It reveals that Britain’s communication intelligence network was then looking for a partner on an urgent basis across Atlantic in order to infiltrate Juniper’s security products.
“The threat comes from Juniper’s investment and emphasis on being a security leader,” the document states.
According to the document, Juniper was not the market leader but the firm’s products were of particular importance as they were used by countries such as Pakistan, India, China and Yemen, which were major targets of American and British spy agencies.
The document is one of thousands classified intelligence documents leaked by Snowden in 2013, revealing the extent of spy activities by the NSA and its sister organization, GCHQ.
It warns that signals intelligence (SIGINT) agencies could be left unable to keep up with technological advance.
“If the SIGINT community falls behind, it might take years to regain a Juniper firewall or router access capability if Juniper continues to rapidly increase their security.”
The document was one of thousands leaked by NSA contractor-turned-whistleblower Edward Snowden.
The revelation caught both Washington and London in hot water as the two countries’ spy networks collected phone and email data of millions of people including their leaders around the world.
To avoid espionage charges, Snowden fled his country and was granted asylum in Russia, where he currently resides. Many Americans consider Snowden as a whistle-blower and a national hero for blowing the lid off the US government’s global surveillance operations.
Asked about the document, GCHQ says it does not comment on intelligence matters and complies with “a strict legal and policy framework.”
Juniper told the Intercept in a statement that it “operates with the highest of ethical standards and is committed to maintaining the integrity, security, and quality of our products.”
GCHQ says it does not comment on intelligence matters and operates within a strict legal framework.
In a statement, Juniper told the Intercept it “operates with the highest of ethical standards.”
Google is working on there own Messaging Application, Google is not satisfied with Google Hangout Application if that’s true. According to Wall street Journal Report, AI Powered messaging service.
Google is working on the application for the last one year. They hired Nick Fox as a Team leader for this Application Project. Most of the google products are educative, useful and worthy. Google has not officially release the date yet according to our research from other websites we found this will take 6 more months to reach there final goal.
Google is working on providing artificial intelligence (AI) to there chat service where they can ask questions and receive there answers based on what user has asked!
As written in the report, Google will rely on its AI technology to help separate its offering from the competitors at Facebook and Skype.
For its new service, Google, a unit of Alphabet Inc., plans to integrate chatbots, software programs that answer questions inside a messaging app, the people familiar with the matter said. Users will be able to text friends or a chatbot, which will scour the Web and other sources for information to answer a question, those people said.
Many Anonymous Posting on Facebook About Facebook Spam Filter and Their Accounts are getting blocked by Facebook for no Reason just doing freedom of Speech!
From last month Facebook is Giving Verifications and Banning People from their Community because of huge amount of Facebook Usage! They wanted to make sure Everyone having a single account on their community.
So called Freedom of Speech!
Greetings my fellow Anonymous brothers & sisters recently Facebook the biggest & most corrupt social media giant out there has been censoring profiles that are associated with Anonymous the reason for this being is that Facebook does not allow you to have any privacy what so ever & you are not allowed to be Anonymous now ask yourself this question why would they remove these profiles?? well the answer is simple these following people were Anonymous & wanted to remain Anonymous we will not stand by & watch our fellow brothers & sisters have their accounts being tampered with Facebook you shall expect us.
There more videos and News Posted About Anonymous Declare War on Facebook!
Since Anons are busy Doing Operations, Facebook Removing them from Joining and Doing Activism and fighting for there rights! So they are moving to other social communities like there own IRC Networks hidden Networks and Social Media!
The reason is because someone or you, tried accessing your Facebook account from a region or location not familiar with Facebook.
Another factor that could result to this is device. Yes sometimes the kind of device you use in accessing your Facebook account could result in your account temporarily blocked.
We know how much our Facebook friends mean to us and it would be very disastrous to wake up one morning to find out that your Facebook account is temporarily blocked, so inorder to prevent this, i have come up with some certain things to avoid.
1. Don’t Access your Facebook account using proxy servers. Proxy servers are anonymous ips used in accessing blocked sites, using such servers might cause negatively effect to your Facebook account. Through not all proxies affects, but proxies unknown to facebook will affect so i think its better you dont use them.
2. Prevent Using Too Many Devices In Accessing Your Facebook Account : Lately, there has been lots of devices that allow direct log on to Facebook thus allowing you to sign in to your account, am not saying this third party devices will cause harm but preventing the use of too many will definitely keep you on a safer side.
I think so far so good this are the common issues that leads to temporary locking of Facebook accounts based on my speculations but i really wonder why Facebook has to fix just one verification process which is very difficult to answer, i just hope they make things better when next mark does he’s changes as usual.
The method is very simple and you will just need to have an another whatspp app that you will get from an online portal that we had discussed in our steps and with that you can register another number to run multiple account in your device. So follow up the below steps to proceed.
Steps To Install Multiple Whatsapp On iPhone
First of all you need to have official Whatsapp to be installed on your iPhone and if not then install it in your device and the first number must be registered in your official whatsapp app.
Now go to the website – ios.othman.tv in your iPhone.
Now you will see the below page in the opened site .
Now you will see the options of all the apps including whatsapp whose icon will come from orange to green, now tap on the icon to install Whstapp 2 on your ios device.
Now the app will start downloading in your device and this will take time depending upon your internet speed.
Now when the app get downloaded you will have to tap on it to install the app and at that time you will see the popup that will appear asking you to grant permission to that installation.
Now in your iPhone navigate to Settings -> General and there simply tap on Profile and then simply tap on trust “VNE Software and Technology…“ .
Now you will see a popup asking to confirm the trust.
Now simply open the whatsapp app that you recently installed and then register your second number there and then follow the installation guide.
Thats it you are done, now you have two whatsapp account in your iPhone and also using the same site you can get the duplicate of other apps too.
So above is all about Run Multiple Whatsapp Accounts on iPhone. With this method you can easily run multiple whatsapp account in your single device
On Wednesday, the Raspberry Pi tweeted a photo of an email which offered the cash and ask the foundation to install a malware onto their computer before shipping them out. Which was kind a insane thing to ask to such a great foundation.“Amazing. This person seems to be very sincerely offering us money to install malware on your machines,” said Liz.
Certainly that it is not the real name as in the picture and overseen the success of Raspberry Pi have brought them into the limelight. By now they have sold over 5 Million units and the number are still rising
The best part of Raspberry Foundation is the vision they have and all the money raised from selling these units go to a good cause. The money is invested in its largest educational missions and research centers. The foundation also train teachers for free and provide free educational resources.
This email has proved how the hackers are eager to bring down this mini computer with immense capability. The best thing about the foundation is the cheapest price for the source of education.
‘Raspberry Pi Foundations ‘ Liz Upton has deemed them, But after reading, reading about the estimated $70 million torrent piracy sites are ranking for serving malware to free media seekers. He also added “It makes him wonder how many other legitimate tech companies are receiving similar offers.
The fact that this group of “evildoers,” as Raspberry Pi Foundations’ Liz Upton has deemed them, would be so bold as to offer charitable groups like Raspberry Pi money to plant malicious software gives a small window of insight into just how hard some bad folks are will to work at spreading their evil schemes. But after reading about the estimated $70 million torrent piracy sites are raking in from serving malware to free media seekers, the offer is not surprising. It makes you wonder how many other “legitimate” tech companies are receiving similar offers and are perhaps even taking bad guys up on those offers.