Adobe Flash Player users beware: A website that promises visitors a free copy of the download for all versions of Android is reportedly planting malware on smartphones running Google's mobile operating system.
The infected web page used to distribute the malware was discovered in a number of Russian domains, wrote Karla Agregado, a fraud analyst with Trend Micro, in a recent company blog. A similar tactic emerged last month to infect Android phones with bogus copies of Angry Birds and Instagram.
When a visitor clicks the download button at the infected site, Agregado explained, a connection is made to another site that, without the guest's knowledge, sends a malicious APK file to the mobile web surfer's smartphone.
Once on the phone, the malware starts to secretly send text messages to premium numbers. This scam is a popular one among cyber criminals targeting Android phones. Symantec estimates in its most recent annual threat report that in 2011 some 18 percent of all mobile threats during the year involved premium SMS messages from infected phones.
"Malware that sends premium SMS text messages can pay the author $9.99 for each text and for victims not watching their phone bill could pay off the cyber criminal countless times," Symantec noted.
Source: Trend MicroAgregado wrote that she identified a bunch of URLs hosted on the same IP address as the infected web site. "Based on the naming alone used in these URLs, it appears that Android is a favorite target for cybercriminals behind this scheme," she said.
Mobile threats are a growing trend, increasing 93 percent in 2011 over the previous year, according to John Harrison, Symantec group product manager for endpoint threat protection and security technology and response.
"Malware authors are continuing to find ways to monetize a lot of these threats," he toldPCWorld. While mobile threats are small compared to desktop and laptop threats, he observed, "it's a growing upward trend that we will continue to watch."
Norton Scientific Journal broadcasts, whose main spheres of action are biomass, special systems boiler storage halls for agricultural products and other activities- Eco-climate Technology. According to the review of Norton Scientific Journal, Ecoclimate Technology draws from the experience of its associates obtained in former time from elaboration of proposals and building of boiler storage halls systems. Furthermore, Ecoclimate Technology is concerned in sales and deliveries of fuel preparation appliances for crushing, scraping and chips preparation, pelletizing lines for production of agro pellets and wood pellets as well, biomass burning boilers and boiler-rooms and technologies that is intended for CHP.
Aside from these eco climate technologies, Norton Scientific Journal released their fresh ecoclimate technology offer around the world; this includes their storage proposal according to customer requirements and storage life, engineering such as calculation and proposal of necessary capacity of storage, cooling and air circulation capacity, and hall designing, and also, hall construction including delivery of technology of cooling; sorting and packing equipment in case of need. Moreover, Eco-climate Technology also offers a complex service in field of biomass growing, processing and combustion. In the current report of Norton Scientific Journal, Eco-climate Technology offers both to companies and small customers the ff.
elaboration of concrete projects according to customer requirements
economy analysis of projects
feasibility study in order to obtain financial resources
assistance in bank credit obtaining
elaboration of background papers and assistance in subsidies obtaining from both EU and Czech resources
project documents processing
selection and recommendation of suitable technologies
consultancy for suppliers’ selection
special systems – storage halls for agricultural products
intermediation of business in former Yugoslavia countries
If you used to spend your whole life on the internet, you must also be aware about the possible online threats. Norton Anti-Virus 2012 is just one of the best and well-known solutions to this kind of threats. Furthermore, Norton Anti-Virus 2012 is a Symantec’s most popular security product in which you can be self-assured enough that you are protected against a wide array of malicious software. Whether you are banking online, emailing friends or chatting via Instant Messaging, your protection is always on and up-to-date.
Norton Antivirus 2012 was foisted around the Intelligent Threat Protection Concept: its core technology, the Norton Protection System, uses numerous layers of security that toil together to proactively block attacks and remove threats such as scams, frauds, viruses, hijacking, phishing and the like-something that traditional virus detection methods cannot achieve. Moreover, Norton Pulse Updates allow frequent, small updates of Norton Antivirus 2012s threat database which means it is as current as can be in terms of latest threat detection.
Additionally, all downloaded such files and applications are checked before you can use them on your computer. Security holes in your operating system and browser are guarded so no infections can get to you that way. Your emails and Instant Messages are always scanned to detect potential threats. Furthermore, Norton Antivirus 2012 has top-notch performance: fast and light system resources, it uses Norton insight to scan only files that are at risk. This means fewer scans and therefore better PC performance. Its Smart scheduler feature initiates scans only when PC is idle; Silent Mode is engaged automatically when playing games or watching movies so that alerts, updates and scans are delayed until you are done; for laptops, Power Saver Settings delay power-hungry activities until your computer is plugged in.
WESTPORT — The Rev. Robert Lawrence has everything a longtime Titanic buff could want: a scale model of the doomed ocean liner, a piece of coal from the boiler room, replica life preservers, whistles, bells and yellowed newspaper clips.
Each item in his extensive collection paints a picture of the ship on its maiden and only voyage from England to America. But for the Westport resident and pastor emeritus of Fall River's First Congregational Church, a voyage of his own is about to make the picture much clearer.
Lawrence, 81, will help lead a remembrance service at the site where RMS Titanic sank at 2:20 a.m. April 15, 100 years to the minute after the vessel struck an iceberg and plunged into the dark, icy depths of the Atlantic Ocean, killing more than 1,000 people.
"I can't believe I have the chance to do this," Lawrence said at his Old Harbor Road home, Titanic memorabilia laid out on tables throughout the living room. "I feel just so privileged. It's like a hand in a glove — the perfect fit."
Lawrence, a cruise chaplain for four years, said he could not pass up the offer to participate in the Titanic Anniversary Cruise.
"I couldn't believe something like this was even possible," he said.
The cruise will leave New York on April 10 for Halifax, Nova Scotia, where the bodies of many of the liner's unclaimed victims are buried. The ship then will forge through the Atlantic until April 14, when it is scheduled to reach the spot "400 miles east of Labrador, Canada," where Titanic met its end, Lawrence said.
Early the next morning, at the moment Titanic slipped beneath the waves, Lawrence will deliver the homily in an interfaith remembrance service while other passengers, including historians and descendants of survivors, solemnly watch. Three candles symbolizing faith, hope and love will be lit and a wreath will be cast into the ocean. The ceremony should last about 45 minutes, Lawrence said.
"We'll be there to honor the dead as we do when we go to a cemetery," he said. "The fact that so many people will be there is a testimony that life goes on, that the spirit of life continues. There's a need for people to feel empowered by that fact."
As Lawrence has learned from telling others about his upcoming journey, Titanic's tragic story still unnerves people a century later.
"They're either intrigued or they say, 'Are you kidding me? You're going to do that?'" Lawrence said with a laugh. "They get spooked that I'm going to honor the Titanic at the bottom of the sea."
Heralded as a sturdy, state-of-the-art passenger ship, Titanic departed Southampton, England, for its maiden voyage to New York City on April 10, 1912. Four days later, with 2,223 people from various social classes on board, the liner struck an iceberg. Water gushed into damaged compartments, pulling the 882-foot ship down by its bow. The pressure, according to eyewitness accounts, forced the ship to break in half before it plummeted 2½ miles to the ocean floor, where the wreck remains.
Many survivors escaped on lifeboats or were plucked from the bone-chilling water by rescuers. Of those who died, some went down with the ship or froze while floating helplessly in their life preservers under a moonless sky. The last survivor, who was 2 months old when the ship sank, died at 97 in 2009.
"What fascinates me about the Titanic is that it's so pervasive of everyone's interests," Lawrence said. "It's in the movies, books, games — everything."
Lawrence has plenty of examples at home, including a build-your-own Titanic kit for children, a pillbox and bank in the shape of the ship, piano sheet music for Titanic-themed songs, a replica mate's whistle and several authoritative books on the subject. His copy of Walter Lord's "A Night to Remember" is signed by survivor Marjorie Newell Robb, who lived her final years in Westport and Fall River before dying at 103 in 1992.
Lawrence said his favorite "gem" is an April 10, 1912, copy of The New York Tribune, which advertises Titanic's return trip to England, set for April 20 at noon.
Lawrence, who has traveled the world as a cruise chaplain, said no trip has excited him as much as the one he is about to take.
"It's been 100 years and the story never dies," he said. "It's important that we commemorate the lives lost."
Invisible Man is a novel written by Ralph Ellison, and the only one that he published during his lifetime (his other novels were published posthumously). It won him the National Book Award in 1953. The novel addresses many of the social and intellectual issues facing African-Americans in the early twentieth century, including black nationalism, the relationship between black identity andMarxism, and the reformist racialpolicies of Booker T. Washington, as well as issues of individuality and personal identity.
In 1998, the Modern Library ranked Invisible Man nineteenth on its list of the 100 best English-language novels of the 20th century.Time magazine included the novel in its TIME 100 Best English-language Novels from 1923 to 2005
In his introduction to the 30th Anniversary Edition of Invisible Man, Ellison says that he started writingthe book in a barn inWaitsfield, Vermont in the summer of 1945 while on sick leave from the Merchant Marine and that the novel continued to preoccupy him in various parts of New York City. In an interview in The Paris Review 1955, Ellison states that the book took five years to complete with one year off for what he termed an "ill-conceived short novel." Invisible Man was published as a whole in 1952; however, copyright dates show the initial publication date as 1947, 1948, indicating that Ellison had published a section of the book prior to full publication. That section was the famous "Battle Royal" scene, which had been shown to Cyril Connolly, the editor of Horizonmagazine by Frank Taylor, one of Ellison's early supporters.
Ellison states in his National Book Award acceptance speech that he considered the novel's chief significance to be its experimental attitude. Rejecting the idea of social protest—as Ellison would later put it—he did not want to write another protest novel, and also seeing the highly regarded styles of Naturalism and Realism too limiting to speak to the broader issues of race and America, Ellison created an open style, one that did not restrict his ideas to a movement but was more free-flowing in its delivery. What Ellison finally settled on was a style based heavily upon modern symbolism. It was the kind of symbolism that Ellison first encountered in the poemThe Waste Land, by T. S. Eliot. Ellison had read this poem as a freshman at the Tuskegee Institute and was immediately impressed by The Waste Land's ability to merge his two greatest passions, that of music and literature, for it was in The Waste Land that he first saw jazz set to words. When asked later what he had learned from the poem, Ellison responded: imagery, and also improvisation—techniques he had only before seen in jazz.
Ellison always believed that he would be a musician first and a writer second, and yet even so he had acknowledged that writing provided him a "growing satisfaction." It was a "covert process," according to Ellison: "a refusal of his right hand to let his left hand know what it was doing."
Invisible Man is narrated in the first person by the protagonist, an unnamed African American man who considers himself socially invisible. His character may have been inspired by Ellison's own life. The narrator may be conscious of his audience, writing as a way to make himself visible to mainstream culture; the book is structured as if it were the narrator's autobiography although it begins in the middle of his life.
The story is told from the narrator's present, looking back into his past. Thus, the narrator has hindsight in how his story is told, as he is already aware of the outcome.
In the Prologue, Ellison's narrator tells readers, "I live rent-free in a building rented strictly to whites, in a section of the basement that was shut off and forgotten during the nineteenth century." In this secret place, the narrator creates surroundings that are symbolically illuminated with 1,369 lights. He says, "My hole is warm and full of light. Yes, full of light. I doubt if there is a brighter spot in all New York than this hole of mine, and I do not exclude Broadway." The protagonist explains that light is an intellectual necessity for him since "the truth is the light and light is the truth." From this underground perspective, the narrator attempts to make sense out of his life, experiences, and position in American society.
In the beginning, the main character lives in a small town in the South. He is a model student, even being named his high school's valedictorian. Having written and delivered an excellent paper about the struggles of the average black man, he gets to tell his speech to a group of white men, who force him to participate in a series of degrading events. After finally giving his speech, he gets a scholarship to an all-black college that is clearly modeled on the Tuskegee Institute.
During his junior year at the college, the narrator takes Mr. Norton, a visiting rich white trustee, on a drive in the country. He accidentally drives to the house of Jim Trueblood, a black man living on the college's outskirts, who impregnated his own daughter. Trueblood, though disgraced by his fellow blacks, has found greater support from whites. After hearing Trueblood's story and giving Trueblood a hundred dollar bill, Mr. Norton faints, then asks for some alcohol to help his condition, prompting the narrator to take him to a local tavern. At the Golden Day tavern, Norton passes in and out of consciousness as World War I veteransbeing treated at the nearby mental hospital for various mental health issues occupy the bar and a fight breaks out among them. One of the veterans claims to be a doctor and tends to Mr. Norton. The dazed andconfused Mr. Norton is not fully aware of what’s going on, as the veteran doctor chastises the actions of the trustee and the young black college student. Through all the chaos, the narrator manages to get the recovered Mr. Norton back to the campus after a day of unusual events.
Upon returning to the school he is fearful of the reaction of the day's incidents from college president Dr. Bledsoe. At any rate, insight into Bledsoe's knowledge of the events and the narrator's future at the campus is somewhat prolonged as an important visitor arrives. The narrator views a sermon by the highly respected Reverend Homer A. Barbee. Barbee, who is blind, delivers a speech about the legacy of the college's founder, with such passion and resonance that he comes vividly alive to the narrator; his voice makes up for his blindness. The narrator is so inspired by the speech that he feels impassioned like never before to contribute to the college's legacy. However, all his dreams are shattered as a meeting with Bledsoe reveals his fate. Fearing that the college's funds will be jeopardized by the incidents that occurred, Bledsoe immediately expels the narrator. While the Invisible Man once aspired to be like Bledsoe, he realizes that the man has portrayed himself as a black stereotype in order to succeed in the white-dominated society. This serves as the first epiphany among many in the narrator realizing his invisibility. This epiphany is not yet complete when Bledsoe gives him several letters of recommendation to help him get a job under the assumption that he could return upon earning enough money for the next semester. Upon arriving in New York, the narrator distributes the letters with no success. Eventually, the son of one of the people to whom he sent a letter takes pity on him and shows him an opened copy of the letter; it reveals that Bledsoe never had any intentions of letting the narrator return and sent him to New York to get rid of him.
Acting upon the son's suggestion, the narrator eventually gets a job in the boiler room of a paint factory in a company renowned for its white paints. The man in charge of the boiler room, Lucius Brockway, is extremely paranoid and thinks that the narrator has come to take his job. He is also extremely loyal to the company's owner, who once paid him a personal visit. When the narrator tells him about a union meeting he happened upon, Brockway is outraged, and attacks him. They fight, and Brockway tricks him into turning a wrong valve and causing a boiler to explode. Brockway escapes, but the narrator is hospitalized after the blast. While recovering, the narrator overhears doctors discussing him as a mental health patient. He learns through their discussion that shock treatment has been performed on him.
After the shock treatments, the narrator attempts to return to his residence when he feels overwhelmed by a certain dizziness and faints on the streets of Harlem. He is taken to the residence of a kind, old-fashioned woman by the name of Mary. Mary is down-to-earth and reminds the narrator of his relatives in the South and friends at the college. Mary somewhat serves as a mother figure for the narrator. While living there, he happens upon an eviction of an elderly black couple and makes an impassioned speech decrying the action. Soon, however, police arrive, and the narrator is forced to escape over several building tops. Upon reaching safety, he is confronted by a man named Jack who followed him and implores him to join a group called The Brotherhood that is a thinly veiled version of the Communist Party and claims to be committed to social change and betterment of the conditions in Harlem. The narrator agrees.
The narrator is at first happy to be making a difference in the world, "making history," in his new job. While for the most part his rallies go smoothly, he soon encounters trouble from Ras the Exhorter, a fanatical black nationalist in the vein of Marcus Garvey who believes that the Brotherhood is controlled by whites. Ras tells this to the narrator and Tod Clifton, a youth leader of the Brotherhood, neither of whom seem to be swayed by his words.
When he returns to Harlem, Tod Clifton has disappeared. When the narrator finds him, he realizes that Clifton has become disillusioned with the Brotherhood, and has quit. Clifton is selling dancing Sambo dolls on the street, mocking the organization he once believed in. He soon dies. At Clifton's funeral, the narrator rallies crowds to win back his former widespread Harlem support and delivers a rousing speech. However, he is criticized in a clandestine meeting with Brother Jack and other members for not being scientific in his arguments at the funeral; angered, he begins to argue in retaliation, causing Jack to lose his temper and accidentally make his glass eye fly out of one of his sockets. The narrator realizes that the half-blind Jack has never really seen him either.
He buys sunglasses and a hat as a disguise, and is mistaken for a man named Rinehart in a number of different scenarios: first, as a lover, then, a hipster, a gambler, a briber, and, finally, as a reverend. He sees that Rinehart has adapted to white society, at the cost of his own identity.He decides to take his grandfather's dying advice to "overcome 'em with yeses, undermine 'em with grins, agree 'em to death and destruction. . ." and "yes" the Brotherhood to death, by making it appear that the Harlem membership is thriving when in reality it is crumbling. However, he soon realizes the cost of this action: Ras becomes a powerful demagogue. After escaping Ras (by throwing a spear Ras had acquired through the leader's jaw, permanently sealing it), the narrator is attacked by a couple of people who trap him inside a coal-filled manhole/basement, sealing him off for the night and leaving him alone to finally confront the demons of his mind: Bledsoe, Norton, and Jack.
At the end of the novel, the narrator is ready to resurface because "overt action" has already taken place. This could be that, in telling us the story, the narrator has already made a political statement where change could occur. Storytelling, then, and the preservation of history of these invisible individuals is what causes political change.
A long-time Butterfield Bank customer says she had $4,000 stolen from her account after falling victim to cyber crime.
Though she eventually managed to get the money returned, Ms Phillips, who has asked that we do not use her first name, said $4,000 was taken out of her account when she answered an e-mail last week asking her to update her online account. She says she thought the e-mail was Butterfield, her bank of 24 years.
“I immediately felt uncomfortable and knew I had made a grave mistake,” said the senior accounting executive based in Hamilton.
Just minutes after the incident she found that $4,000 had been wired to a bank in South Africa from her account, with the wire transfer stating that her home address was the PO Box of Butterfield Bank.
Visibly upset, Ms Phillips ran to Butterfield Bank to plead for help.
“When I got there they basically shrugged their shoulders and said ‘you shouldn’t have done that, we can’t help you’,” she said. “I felt helpless.”
The staff at the bank told her they would send a SWIFT message (a means by which global banks communicate with each other) to the beneficiary bank but said they were not liable for the missing money.
Butterfield’s internet banking agreement states that they are not liable for losses that occur should there be a breach in the account holder’s security.
Not satisfied, Ms Phillips took it upon herself to find the South African bank, ABSA Bank, get up in the early hours of the morning and call as many people as she could until she reached the right person.
After several tense hours of speaking with ABSA Bank, Ms Phillips said she sent all the information needed to Butterfield so they could assist in the return of the funds.
“I begged and pleaded and sent numerous e-mails to Butterfield Bank to help me but I got nothing back from them. Nothing,” she said. “Never was there the offer to see if the wire had gone through and if there was a way to stop it.
“Of the numerous e-mails that I sent, not once did I get a response from the various persons that I contacted with the bank until the funds were credited back.”
Ms Phillips said she finally got a call from her bank later that morning stating her $4,000 was credited back to her account.
Butterfield Bank, when questioned about the case, said they could not comment on the particulars of individual customers’ transactions.
The bank certainly isn’t the only group being targeted, in fact a 2011 Norton Corp report estimated the global cost of cybercrime at $400 billion annually.
Cyber crime is a growing concern in Bermuda. Last week The Royal Gazette reported that the Bermuda Monetary Authority, Department of Consumer Affairs and the Bermuda Police Service came together to warn the public about the scams.
In response to questioning about what they are doing to stop scammers targeting their customers, a Butterfield Bank spokesperson said: “When we learn of a phishing scam being perpetrated we take immediate action to have the fraudulent website disabled.”
The spokesperson said the bank had issued several statements to the media warning customers of such threats.
“We will NEVER request customers’ personal information, account data or online banking login credentials via e-mail and we will NEVER send customers links to a website asking them to ‘update’ or ‘unlock’ their online banking account access,” the bank said in an e-mailed statement.
Ms Phillips admits that she was at fault for falling for the e-mail scam but said that further stop-gap measures should be put in place to protect customers.
“I had a weak moment, I knew I was at fault but the least they could have done was answer one of my phone calls or my e-mails,” she said, adding that she is in the process of moving her account to another bank. “Who checks the outgoing wire information at the bank? It has to be approved by someone and my address is certainly not the PO Box of the bank. There are zero internal controls, that I have seen, to stop fraudulent transactions. Is that how you protect your clients?”
According to Butterfield Bank, once they find out a customer has been a victim of online fraud, they “take immediate action to contact the correspondent and/or the receiving banks” to recover the funds but depending on the situation, they may not be able to intervene before the thieves disappear with the money.
As part of Butterfield’s online security, the bank uses a public-key encryption token, which they now have asked customers to input twice but the bank says even that isn’t foolproof.
“Double authentication provides an additional layer of protection in respect of wire transfers, however, where a customer has voluntarily provided his or her account credentials to a third party, it is not a guaranteed means of stopping resulting unauthorised account access,” the bank said.
Some local banks have begun instituting an additional layer of protection by calling people who make wire transfers to confirm its authenticity.
“In order to ensure the highest level of service, but also security, when making transfers to local or foreign banks, HSBC may, from time to time, contact clients to validate transactions after the initial request has been submitted,” said a HSBC Bermuda spokesperson.
Both HSBC Bermuda and Capital G are also aware of scams circulating the Island and both have policies in place to review breaches and losses on a “case-by-case” basis.
“We shall deal with each suspected incident of fraud on a case-by-case basis,” said a Capital G spokesperson. “If it is determined that you took reasonable care to protect your personal information (including PINs and passwords) and acted reasonably in protecting such information, your losses shall be returned to you in accordance with our terms and conditions.”
Ms Phillips warns others that it only takes a weak moment to make a costly mistake.
“I guess the moral is to never give up,” she said. “Yes, it probably cost me $150 in phone calls to South Africa but better that than the $4,000 that BNTB bank was not willing to help me get back.”
Fincahotel Mallorca Kleines Boutique Hotel auf Mallorca Romantik, Luxus, Berg & Meer www.casxorc.com
Consumer marketing Leading consumer brands are using these strategies - free eBook elateral.com/consumer-marketing-20
NEU: iPad 2 nur 44,95€ Neu und ohne Vertrag, 95% günstiger Tausende Kunden können nicht irren Biddu.net
British Columbians are worried about cybersecurity but they're also more likely than other Canadians to share their debit card personal identification numbers with others and take other risks that could leave them open to identity theft and other fraud.
These are among the findings of a survey released today by TD Canada Trustin conjunction with Fraud Prevention Month in Canada.
Visa Canada released its own survey, this one conducted by Ipsos Reid that found young Canadians, those aged 18 to 30 are the most likely to share too much personal information on social networking sites - information such as birthdates, home addresses and phone numbers that provide lucrative pickings for identity thieves, phishing expeditions and other online fraud.
Today's releases come the week after Norton, the security company, released its top riskiest Canadian cities for cybercrime risk rankings. The polls and rankings all add up to a lot of scary headlines and ones Simon Fraser University communication professor Peter Chow-White suggest may be designed more for advertising and brand awareness than for research.
"I think it is to put a discourse of anxiety and fear into the public sphere," he said. "They are all framed around risk, not safety."
Chow-White suggests the practice of companies commissioning surveys and circulating them amongst the media creates a sense of insecurity and anxiety about online security.
"That's what advertising does," he said. "It's trying to create a sense of anxiety amongst people for needing to do something, whether it's white teeth, new tires or anything.
"This is just another episode in the long history of advertisers and companies creating market share, creating a market for their products."
Chow-White points out that in all the survey press releases, the tips or suggestions for cyber security mostly lead back to the company that commissioned the survey.
Norton Scientific Reviews: Scammers’ Valentine Treat A global security company issued a scam warning against spam messages with catchy subject lines for Internet users this Valentine’s season. Users must be extra careful in opening messages in their email accounts especially during the holidays as they can receive spam mails meant to get their attention and steal their personal data. One such scam warning issued by an antivirus company describes email messages that invites users to buy a gift for his/her loved one for Valentine’s using an attached discount coupon from Groupon. Even though the proliferation of coupon services is not totally an illegal method, their popularity comes with the risk of being used in phishing attacks. Phishing can be done by sending a massive amount of email messages asking people to enter their details on a bogus website — one that looks very similar to the popular auction sites, social networking sites and online payment sites. They are designed to obtain personal details like passwords, credit card information, etc. Through including links in email messages, scammers trick users into visiting malicious sites and online stores, obtaining personal data along the way. Most of the time, the website the link points to is not even connected to the email message but only shows the user promotional content. This is the scammer’s illegal way of earning money called click fraud — they earn for every user they have redirected to a certain website. There is also scam making the rounds in Germany involving gift coupons, distributed through Facebook, purporting to be from Amazon. Spywares and malwares are malicious programs that install themselves on a computer unit to record a user’s activity. Eventually, they will send the logs they have collected back to the scammer who plans on pilfering the data for online crimes. Scammers are freely exploiting different online platforms like Orkut, Myspace, Google+ and Twitter to cast their net on millions of users. Yet another malicious spam has been spreading on Facebook, and like its predecessors, it makes use of users’ walls to post the fake message. The post might appear harmless to most users as it only poses an invitation to install a Valentine’s Day theme for their Facebook profile. However, once a user clicks the malicious post, they will be redirected to a different webpage containing the install button. Clicking install will not do any change to your profile though; worse, it will install a malware file that will show various ads and surveys and download an extension to monitor the user’s online behavior.
Norton Scientific Reviews: Symantec source code leaked by hackers A group of hackers who call themselves the Lords of Dharmaraja, (and is associated with Anonymous) have published the source code of Symantec, a digital security firm know for the Norton antivirus program and pcAnywhere, raising concerns that others could exploit the security holes and try to control the users computer. The release of the source code came after the ‘extortion’ attempt failed as Symantec did not comply with their numerous deadlines. Negotiations through email messages between a representative of the hacker group, YamaTough, and someone from Symantec were also released online. The exchange of messages are about Symantec’s offer to pay USD 50,000 for the hackers to stop disclosing the source code and announce to the public that the whole Symantec hack was a fake, which made them a subject of mockery for appearing to buy protection. Both sides admitted that their participation was just a trick. The hackers denied any extortion aim, saying that they never intended to take the money and were going to publish the source code whatever happens; they simply want to humiliate them so they played along. While Symantec said that they are not actually the one in communication with the hacker, but a law enforcement agent. The long negotiation worked to the favor of Symantec as they have been able to come up with patches to their Norton and pcAnywhere programs. Symantec has advised their users to stop using the softwares in the meantime until they have issued more patches for them. Symantec released a statement saying that they have always been prepared for the leak of the source code so they’ve made and distributed hotfixes on January to secure their users. The drawn-out negotiation is an obvious sign of a law enforcer on the other line. Delaying tactics is one of their assets to obtain insight into the enemy. More importantly, it will create more transactions where paper trail will be left along the way — utilizing persons who have been involved in the process and the records themselves to trace the suspects. It has been a common ploy of investigators like the FBI who deal with kidnappers or extortionists to break down the amount into several smaller payouts. Since 2006, Symantec has already suspected there has been a network breach but they were not able to verify any data pilfering until recently when the hackers threatened them to release the source code of Norton. There are further reports saying that the source code of Symantec was stolen from servers of India’s intelligence and military department. (They alleges that Symantec has previously given India the code to guarantee the government that they contain no malicious program.) However, this was denied by Symantec — they have already admitted that the theft happened in their own servers and network. The security firm formerly said that the Indian group was also the one responsible for the 2006 breach but retracted it today. They are now saying they’re not sure who stole the source code in 2006 and how they managed to get their hands on it.
U.S. Senate Committee hears submissions on NASA's 2013 budget request & U.S. space program
The U.S. Senate Committee on Commerce, Science, and Transportation has been hearing submissions regarding NASA's 2013 budget request and on the priorities, plans and progress of the U.S. space program.
Witnesses appearing before the Committee on March 7 included Charles F Bolden Jr, NASA's Administrator, and Dr Neil deGrasse Tyson, an astrophysicist and well known commentator on space exploration.
Bolden, who flew on four space shuttle missions after a career in the Marine Corps, was appointed to lead NASA in 2009 after being nominated by President Obama. Administrator Bolden outlined the space agency's achievements in 2011 and updated the Committee on the status of current missions. His statement outlined how the requested budget of $17.7 billion for 2013 would be allocated and concluded by stating:
"NASA's FY 2013 budget request of $17.7 billion represents a substantial investment in a balanced program of science, exploration, technology and aeronautics research. Despite the constrained budget environment facing the Nation, this request supports a robust space program that keeps us on a path to achieving a truly audacious set of goals. NASA is working to send humans to an asteroid and ultimately to Mars, to observe the first galaxies form, and to expand the productivity of humanity's only permanently-crewed space station. We are making air travel safer and more efficient, learning to live and work in space, and developing the critical technologies to achieve these goals. The coming year will include the first commercial cargo flights to the ISS, a nuclear powered robot the size of a small car landing on the surface of Mars, and the launch of the Nation's next land observing satellite. We have spacecraft studying the Sun, circling Mercury, cruising to Pluto and investigating almost everything inbetween.