tag:blogger.com,1999:blog-23083292184376052092024-02-22T02:20:59.535-08:00Chaminda Ranasinghe:::Welcome to my blog:::Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.comBlogger92125tag:blogger.com,1999:blog-2308329218437605209.post-32568796505168674572012-03-06T05:52:00.000-08:002012-03-06T05:56:14.445-08:00Windows 8 Consumer Preview<p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); ">The Windows 8 preview will be available in 3 hours for download here:</p><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "><a href="http://windows.microsoft.com/en-US/windows-8/preview" style="text-decoration: none; color: rgb(105, 68, 68); ">http://windows.microsoft.com/en-US/windows-8/preview</a></p><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); ">My Laptop is ready, can’t wait.</p>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-51290065014580780812012-03-06T05:51:00.000-08:002012-03-06T05:52:25.335-08:00Lync Mobile for Android Update<p class="ms-rteFontSize-2" style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); ">Last week (on 23th February) Microsoft released an update for the Android Lync client.</p><p class="ms-rteFontSize-2" style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); ">Here are the main features of the updates:</p><ol class="ms-rteThemeFontFace-1 ms-rteFontSize-2" style="color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "><li>Enabled call-via-work – allowing Enterprise Voice enabled users to make and receive calls using your Enterprise Voice (Lync ID) number only. Connect with others using a single identity.</li><li>Added user controls for adjusting the sound/vibration for incoming notifications</li><li>Improved the Lync status icon : know if you can receive IM messages</li><li>Enabled copy of IM text to the clipboard</li><li>Multiple bug fixes</li></ol><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "></p><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "><span style="font-family: Verdana; "><span >I have installed the new version of the Lync client and happy to see the development ongoing.</span></span></p><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "><span style="font-family: Verdana; "><span >A nice feature for Android is now that it is also possible to "call-via-work" which was only deployed for iOS in the beginning.</span></span></p><p style="margin-bottom: 1em; margin-top: 0em; color: rgb(102, 102, 102); font-family: Georgia, 'Times New Roman', serif; line-height: 19px; text-align: -webkit-auto; background-color: rgb(255, 255, 255); "><span style="font-family: Verdana; "><span >Another point is the improved status icon. Now it is always visible in the notification bar showing the currently set status and if there are new instant messaging invites you will get a second notification next to the status icon.</span></span></p>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-52696052652866978072011-07-12T23:27:00.000-07:002011-07-12T23:30:17.160-07:00Toshiba database hacked and leaked !<span class="Apple-style-span" style="font-family: 'Trebuchet MS', Trebuchet, Verdana, sans-serif; -webkit-tap-highlight-color: rgba(26, 26, 26, 0.296875); -webkit-composition-fill-color: rgba(175, 192, 227, 0.230469); -webkit-composition-frame-color: rgba(77, 128, 180, 0.230469); color: rgb(102, 102, 102); line-height: 20px; -webkit-text-size-adjust: none; ">A hacker named <span class="Apple-style-span" style="line-height: 24px; "><span style="background-color: transparent; background-image: none; border-bottom-width: 0px; border-collapse: collapse; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: none; cursor: auto; display: inline; font-style: inherit; font-variant: inherit; letter-spacing: inherit; line-height: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; text-decoration: inherit; text-indent: 0px; text-transform: inherit; vertical-align: baseline; white-space: inherit; word-spacing: inherit; "><span style="background-color: transparent; background-image: none; border-bottom-width: 0px; border-collapse: collapse; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: none; cursor: auto; display: inline; font-style: inherit; font-variant: inherit; letter-spacing: inherit; line-height: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; text-decoration: inherit; text-indent: 0px; text-transform: inherit; vertical-align: baseline; white-space: inherit; word-spacing: inherit; "><span class="Apple-style-span" style="font-family: inherit; "><b>V0iD </b>hacked<b> toshiba</b> <a href="http://us.toshiba.com/" style="text-decoration: none; color: rgb(34, 136, 187); ">website</a> and <b>database leaked</b> through a pastebin <a href="http://pastebin.com/mFwijETu" style="text-decoration: none; color: rgb(34, 136, 187); ">post</a>. The leak includes the Username-Passwords of Admins too. It is also reported that, the same hacker <b>hacked</b> the database of <b>National Assembly of Pakistan</b><a href="http://www.na.gov.pk/" style="text-decoration: none; color: rgb(34, 136, 187); "> website</a> too.</span></span></span></span></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-24639605669570586942011-07-06T17:37:00.000-07:002011-07-06T17:44:26.556-07:00Seven recommendations for a Safer Facebook<div style="text-align: left;">1. Full SSL browsing enforced and mandatory for everyone. This is already available in Facebook via the privacy settings. This way, all users can make sure nobody is snooping in on their</div><div style="text-align: left;">conversations, even if they’re browsing Facebook through an untrusted internet connection,</div><div style="text-align: left;">and render attack tools such as Firesheep completely useless.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">2. Two-factor authentication for all users with compatible mobile devices.Banks are offering e-tokens for their customers to safely accessing their online banking accounts, but in a world</div><div style="text-align: left;">where social networking sites are more important than ever, users should have the same technology available for protecting their Facebook accounts as well. This was enabled by Google not so long ago with a relatively simple mobile application. This way, an attacker would have to compromise two devices to get access to a Facebook account.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">3. A clear line between trusted and untrusted Facebook apps. Malicious Facebook apps are being analyzed and reported by researchers on a daily basis – so it would be terrific if Facebook would manually check and approve all incoming applications to make sure no malicious app gets on to an user’s profile. As this task would probably be impossible, an idea would be to have an</div><div style="text-align: left;">ever increasing list of trusted/approved applications that a regular user can add to his profile. If the user wants to use an application that is not trusted, he should be able to run it in some sort of</div><div style="text-align: left;">“profile sandbox”, so that any malicious activity would not affect other users.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">4. Tighten up the “recommended” privacy controls. Currently, the Facebook recommended privacy settings allow “everyone” to access your status, photos, and posts, your bio and favorite</div><div style="text-align: left;">quotations and see your family and relationships, while your “friends of friends” only have access to the photos and videos you’re tagged in, religious and political views plus your birthday.</div><div style="text-align: left;">It is too easy for an attacker to become the friend of a friend of someone and get all the data they need to reset a password for a webmail account. </div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">5. Permanently deleting your account should permanently delete your account -- but it doesn’t. “Copies of some material (photos, notes, etc.) may remain in our servers for technical</div><div style="text-align: left;">reasons, but this material is disassociated from any personal identifiers and completely inaccessible to other people using Facebook”. This needs to be fixed as it is a major privacy and security risk even for people who have removed their Facebook identity.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">6. Commit to keeping children safe by taking parental control to a whole new level. Parents should be able to setup limited access accounts for their children, as subaccounts</div><div style="text-align: left;">under their main Facebook presence. The limited sub-accounts could automatically be turned into full accounts once the child reaches the age of consent.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div><div style="text-align: left;"><div style="text-align: left;">7. Educate your users. Yes, the page at facebook.com/security is a good.</div><div style="text-align: left;"><br /></div><div style="text-align: left;"><br /></div></div></div></div></div></div></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-28685262419852909092011-06-25T11:30:00.000-07:002011-06-25T11:37:14.948-07:00Social Networking and Security Risks<div style="text-align: center;"><br /></div><div style="text-align: center;"><br /></div><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjWjlr2BBGlbdSwyYVkM3LI7tc48ZTkWKtFkUWmwsLBNCgxDV3KGW4MDYJmQS0yZ43cqYs696MJNZJOKL05ryeaGLfHBo48SUOmCoizsE605SExs5cWQuiNEdQotgIy1SHmKF0HrFyBQ00/s400/social-network.jpg" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><span class="Apple-style-span"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 300px;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjWjlr2BBGlbdSwyYVkM3LI7tc48ZTkWKtFkUWmwsLBNCgxDV3KGW4MDYJmQS0yZ43cqYs696MJNZJOKL05ryeaGLfHBo48SUOmCoizsE605SExs5cWQuiNEdQotgIy1SHmKF0HrFyBQ00/s400/social-network.jpg" border="0" alt="" /></span></a><div style="text-align: left;"><u><span class="Apple-style-span" ><b><span class="blsp-spelling-error" id="SPELLING_ERROR_0">WHAT</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1">ARE</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_2">SOCIAL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_3">NETWORKING</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_4">WEBSITES</span> ?</b><br /><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; " class="Apple-style-span"><span class="blsp-spelling-error" id="SPELLING_ERROR_5">Social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_6">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_7">websites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_8">function</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_9">like</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_10">an</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_11">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_12">community</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_13">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_14">internet</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_15">users</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_16">Depending</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_17">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_18">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_19">website</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_20">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_21">question</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_22">many</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_23">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_24">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_25">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_26">community</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_27">members</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_28">share</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_29">common</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_30">interests</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_31">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_32">hobbies</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_33">religion</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_34">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_35">politics</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_36">Once</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_37">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_38">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_39">granted</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_40">access</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_41">to</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_42">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_43">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_44">website</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_45">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_46">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_47">begin</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_48">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_49">socialize</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_50">This</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_51">socialization</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_52">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_53">include</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_54">reading</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_55">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_56">profile</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_57">pages</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_58">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_59">other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_60">members</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_61">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_62">possibly</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_63">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_64">contacting</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_65">them</span>. </span></b><br /><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><span class="blsp-spelling-error" id="SPELLING_ERROR_66">There</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_67">are</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_68">variety</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_69">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_70">people</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_71">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_72">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_73">websites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_74">whom</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_75">we</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_76">don</span>'t <span class="blsp-spelling-error" id="SPELLING_ERROR_77">know</span>..<span class="blsp-spelling-error" id="SPELLING_ERROR_78">Online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_79">meeting</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_80">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_81">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_82">enough</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_83">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_84">understand</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_85">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_86">study</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_87">people</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_88">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_89">he</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_90">right</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_91">guy</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_92">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_93">do</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_94">friendship</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_95">with</span>..<span class="blsp-spelling-error" id="SPELLING_ERROR_96">There</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_97">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_98">always</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_99">risk</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_100">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_101">Blackmailing</span>,<span class="blsp-spelling-error" id="SPELLING_ERROR_102">Malware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_103">Spreading</span>,<span class="blsp-spelling-error" id="SPELLING_ERROR_104">Identity</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_105">Theft</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_106">etc</span>..</span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><br /></span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><span class="blsp-spelling-error" id="SPELLING_ERROR_107">Generally</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_108">peoples</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_109">who</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_110">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_111">aware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_112">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_113">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_114">risks</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_115">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_116">dangers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_117">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_118">Social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_119">Networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_120">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_121">take</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_122">his</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_123">way</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_124">out</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_125">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_126">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_127">crimes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_128">done</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_129">via</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_130">Social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_131">Networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_132">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_133">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_134">Peoples</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_135">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_136">aware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_137">about</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_138">this</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_139">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_140">surely</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_141">be</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_142">prey</span>...</span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><br /></span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><span class="blsp-spelling-error" id="SPELLING_ERROR_143">There</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_144">is</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_145">maximum</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_146">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_147">Social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_148">Engineering</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_149">used</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_150">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_151">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_152">Hackers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_153">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_154">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_155">crimes</span></span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><br /></span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span">=============================================================================</span></span></b><br /><b><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><span class="blsp-spelling-error" id="SPELLING_ERROR_156">DANGERS</span>/<span class="blsp-spelling-error" id="SPELLING_ERROR_157">RISKS</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_158">OF</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_159">SOCIAL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_160">NETWORKING</span>.</span></span></b><br /><u><span style="font: normal normal normal small/normal 'Times New Roman'; text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"><br /></span></span></u><br /></span><div><i><span><u><span style="text-transform: none; line-height: normal; text-indent: 0px; letter-spacing: normal; font-style: normal; font-variant: normal; font-weight: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span" ><span class="blsp-spelling-error" id="SPELLING_ERROR_161">Facebook</span></span></span></u></span></i></div><span class="Apple-style-span" ><span><b><u><span style="text-transform: none; line-height: normal; text-indent: 0px; letter-spacing: normal; font-style: normal; font-variant: normal; font-weight: normal; word-spacing: 0px; white-space: normal; border-collapse: separate; orphans: 2; widows: 2; " class="Apple-style-span"><span style="text-align: justify; " class="Apple-style-span"> </span></span></u></b></span><br /><b><span><span class="blsp-spelling-error" id="SPELLING_ERROR_162">Events</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_163">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_164">Questions</span> </span></b><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_165">You</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_166">must</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_167">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_168">knowing</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_169">about</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_170">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_171">famous</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_172">scam</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_173">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_174">was</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_175">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_176">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_177">some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_178">days</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_179">before</span> "<span class="blsp-spelling-error" id="SPELLING_ERROR_180">View</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_181">Who</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_182">Viewed</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_183">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_184">Profile</span>" . I <span class="blsp-spelling-error" id="SPELLING_ERROR_185">remember</span> i <span class="blsp-spelling-error" id="SPELLING_ERROR_186">got</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_187">more</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_188">than</span> 20 <span class="blsp-spelling-error" id="SPELLING_ERROR_189">invites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_190">for</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_191">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_192">event</span>..<span class="blsp-spelling-error" id="SPELLING_ERROR_193">These</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_194">events</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_195">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_196">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_197">used</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_198">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_199">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_200">hackers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_201">as</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_202">source</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_203">through</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_204">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_205">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_206">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_207">use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_208">their</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_209">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_210">engineering</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_211">skills</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_212">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_213">you</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_214">You</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_215">cannot</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_216">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_217">know</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_218">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_219">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_220">hackers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_221">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_222">using</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_223">their</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_224">skills</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_225">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_226">you</span> ... <span class="blsp-spelling-error" id="SPELLING_ERROR_227">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_228">new</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_229">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_230">feature</span> "<span class="blsp-spelling-error" id="SPELLING_ERROR_231">Questions</span>" <span class="blsp-spelling-error" id="SPELLING_ERROR_232">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_233">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_234">help</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_235">them</span><br /><br /><u><i><span class="blsp-spelling-error" id="SPELLING_ERROR_236">Now</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_237">lets</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_238">take</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_239">Example</span> </i></u><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_240">You</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_241">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_242">invited</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_243">to</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_244">Event</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_245">called</span> "<span class="blsp-spelling-error" id="SPELLING_ERROR_246">About</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_247">me</span>" <span class="blsp-spelling-error" id="SPELLING_ERROR_248">or</span> A <span class="blsp-spelling-error" id="SPELLING_ERROR_249">friend</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_250">asked</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_251">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_252">through</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_253">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_254">Question</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_255">feature</span>..<br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_256">They</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_257">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_258">include</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_259">some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_260">questions</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_261">because</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_262">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_263">topic</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_264">itself</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_265">tell</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_266">About</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_267">Me</span><br /><br />1. <span class="blsp-spelling-error" id="SPELLING_ERROR_268">What</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_269">was</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_270">my</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_271">most</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_272">embarrassing</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_273">moment</span>?<br />2. <span class="blsp-spelling-error" id="SPELLING_ERROR_274">Which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_275">City</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_276">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_277">were</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_278">born</span> ?<br />3. <span class="blsp-spelling-error" id="SPELLING_ERROR_279">What</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_280">was</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_281">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_282">name</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_283">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_284">my</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_285">first</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_286">elementary</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_287">school</span>?<br />4. <span class="blsp-spelling-error" id="SPELLING_ERROR_288">What</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_289">was</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_290">my</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_291">favorite</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_292">pet</span>’s <span class="blsp-spelling-error" id="SPELLING_ERROR_293">name</span>?<br />5- <span class="blsp-spelling-error" id="SPELLING_ERROR_294">What</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_295">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_296">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_297">father</span>'s <span class="blsp-spelling-error" id="SPELLING_ERROR_298">name</span><br /><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_299">These</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_300">question</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_301">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_302">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_303">harmful</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_304">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_305">answer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_306">in</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_307">general</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_308">conversation</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_309">with</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_310">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_311">friends</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_312">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_313">relatives</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_314">But</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_315">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_316">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_317">look</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_318">at</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_319">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_320">questions</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_321">carefully</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_322">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_323">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_324">security</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_325">questions</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_326">asked</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_327">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_328">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_329">SOCIAL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_330">NETWORKING</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_331">SITES</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_332">Using</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_333">this</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_334">sensitive</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_335">information</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_336">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_337">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_338">secret</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_339">questions</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_340">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_341">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_342">access</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_343">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_344">account</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_345">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_346">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_347">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_348">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_349">ruined</span>.</span><br /><br /><br /><b> <span class="blsp-spelling-error" id="SPELLING_ERROR_350">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_351">Applications</span></b><br /></u></div><div style="text-align: left;"><u><b><br /></b></u></div><div style="text-align: center;"><img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiQcSpxoo2poNRico6p7nw5rzSZGYhLdnfuuITMy9PPk4nAbU1O5O1YvXfKw4AFAUSMlqTmatYUwPJzwGeNtWMO0Y3bG4qBGATwuFlnN_k5_IsxuSQoPm6je1kwLCHTA83YPdyT8sdLLGl/s1600/aruna_url_facebook_app.png" /></div><div style="text-align: left;"><br /></div><div style="text-align: left;"><b><span class="blsp-spelling-error" id="SPELLING_ERROR_352">Applications</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_353">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_354">offers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_355">thousands</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_356">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_357">applications</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_358">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_359">its</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_360">users</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_361">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_362">install</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_363">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_364">run</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_365">These</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_366">applications</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_367">include</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_368">calendars</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_369">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_370">allow</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_371">Friends</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_372">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_373">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_374">reminded</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_375">when</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_376">it</span>’s <span class="blsp-spelling-error" id="SPELLING_ERROR_377">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_378">birthday</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_379">tools</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_380">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_381">send</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_382">Friends</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_383">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_384">greeting</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_385">cards</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_386">quizzes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_387">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_388">myriad</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_389">topics</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_390">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_391">much</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_392">more</span>.</b><br /><b></b><br /><b></b><br /><b></b><br /><b></b><br /><b></b><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_393">These</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_394">Applications</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_395">look</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_396">totally</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_397">harmless</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_398">but</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_399">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_400">some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_401">cases</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_402">it</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_403">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_404">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_405">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_406">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_407">used</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_408">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_409">hackers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_410">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_411">deliver</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_412">malicious</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_413">contents</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_414">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_415">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_416">computer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_417">This</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_418">holds</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_419">true</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_420">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_421">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_422">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_423">Facebook</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_424">but</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_425">also</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_426">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_427">other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_428">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_429">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_430">sites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_431">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_432">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_433">the</span> Internet <span class="blsp-spelling-error" id="SPELLING_ERROR_434">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_435">general</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_436">when</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_437">downloading</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_438">from</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_439">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_440">Web</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_441">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_442">opening</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_443">attachments</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_444">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_445">email</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_446">messages</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_447">Therefore</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_448">make</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_449">certain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_450">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_451">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_452">computer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_453">has</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_454">proper</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_455">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_456">functional</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_457">firewall</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_458">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_459">well</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_460">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_461">up</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_462">to</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_463">date</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_464">antivirus</span>/<span class="blsp-spelling-error" id="SPELLING_ERROR_465">anti</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_466">malware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_467">software</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_468">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_469">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_470">install</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_471">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_472">run</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_473">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_474">applications</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_475">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_476">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_477">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_478">from</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_479">trusted</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_480">source</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_481">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_482">approved</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_483">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_484">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_485">corporate</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_486">IT</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_487">department</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_488">We</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_489">call</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_490">them</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_491">JAVA</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_492">APPLETS</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_493">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_494">JAVA</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_495">DRIVE</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_496">BY</span><br /><br /><div style="color: red;"><span style="font-size: large;"><br /></span></div><div style="color: red;"><u><span style="font-size: large;"><span class="blsp-spelling-error" id="SPELLING_ERROR_497">TWITTER</span> </span></u></div><span style="font-size: large;"><span style="font-size: small;"><span style="color: black;"><span style="color: black;"><span class="blsp-spelling-error" id="SPELLING_ERROR_498">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_499">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_500">an</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_501">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_502">application</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_503">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_504">allows</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_505">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_506">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_507">post</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_508">brief</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_509">comments</span> (<span class="blsp-spelling-error" id="SPELLING_ERROR_510">tweets</span>) <span class="blsp-spelling-error" id="SPELLING_ERROR_511">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_512">any</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_513">topic</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_514">Other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_515">users</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_516">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_517">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_518">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_519">network</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_520">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_521">become</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_522">follower</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_523">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_524">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_525">tweets</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_526">such</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_527">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_528">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_529">receive</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_530">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_531">updates</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_532">whenever</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_533">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_534">send</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_535">them</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_536">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_537">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_538">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_539">used</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_540">for</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_541">professional</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_542">purpose</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_543">so</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_544">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_545">risks</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_546">here</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_547">differs</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_548">from</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_549">Facebook</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_550">Generally</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_551">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_552">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_553">used</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_554">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_555">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_556">celebrities</span>,<span class="blsp-spelling-error" id="SPELLING_ERROR_557">Companies</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_558">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_559">tweet</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_560">their</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_561">updates</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_562">every</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_563">time</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_564">Some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_565">body</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_566">told</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_567">me</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_568">some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_569">one</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_570">tweeted</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_571">his</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_572">twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_573">when</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_574">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_575">Osama</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_576">kill</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_577">mission</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_578">started</span>.</span></span></span></span><br /><br /><span style="font-size: large;"><span style="font-size: small;"><span style="color: black;"><span style="color: black;"><span class="blsp-spelling-error" id="SPELLING_ERROR_579">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_580">employes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_581">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_582">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_583">tweet</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_584">something</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_585">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_586">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_587">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_588">harmful</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_589">for</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_590">their</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_591">company</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_592">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_593">companies</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_594">should</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_595">keep</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_596">eye</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_597">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_598">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_599">employes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_600">tweets</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_601">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_602">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_603">tweets</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_604">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_605">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_606">harmful</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_607">for</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_608">their</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_609">future</span>.</span></span></span></span><br /><br /><br /><span style="font-size: large;"><span style="font-size: small;"><span style="color: black;"><span style="color: black;"> </span></span></span></span><u><span style="font-size: large;"><span class="blsp-spelling-error" id="SPELLING_ERROR_610">FRAUDS</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_611">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_612">HOAXES</span> </span></u><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_613">weather</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_614">it</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_615">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_616">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_617">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_618">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_619">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_620">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_621">banking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_622">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_623">day</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_624">to</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_625">day</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_626">purchases</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_627">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_628">aware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_629">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_630">emails</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_631">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_632">claim</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_633">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_634">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_635">from</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_636">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_637">sites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_638">but</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_639">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_640">actually</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_641">hoaxes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_642">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_643">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_644">contain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_645">malicious</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_646">content</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_647">If</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_648">have</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_649">received</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_650">numerous</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_651">emails</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_652">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_653">seems</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_654">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_655">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_656">from</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_657">bank</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_658">yet</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_659">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_660">actually</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_661">sent</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_662">by</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_663">spammer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_664">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_665">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_666">hopes</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_667">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_668">obtaining</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_669">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_670">online</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_671">username</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_672">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_673">password</span>.<br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_674">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_675">messages</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_676">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_677">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_678">contain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_679">an</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_680">attached</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_681">ZIP</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_682">file</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_683">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_684">recipients</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_685">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_686">asked</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_687">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_688">open</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_689">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_690">see</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_691">who</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_692">invited</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_693">them</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_694">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_695">attachment</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_696">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_697">contain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_698">some</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_699">Trojans</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_700">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_701">Malwares</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_702">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_703">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_704">cause</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_705">damage</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_706">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_707">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_708">computer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_709">giving</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_710">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_711">sensitive</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_712">information</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_713">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_714">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_715">hacker</span><br /><div style="color: red;"><u><span style="font-size: large;"><br /></span></u></div><u style="color: red;"><span style="font-size: large;"><span class="blsp-spelling-error" id="SPELLING_ERROR_716">URL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_717">SHORTENING</span> </span></u><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_718">Another</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_719">form</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_720">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_721">hoax</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_722">involves</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_723">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_724">shortening</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_725">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_726">URLs</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_727">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_728">email</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_729">messages</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_730">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_731">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_732">websites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_733">such</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_734">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_735">our</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_736">favorites</span>: <span class="blsp-spelling-error" id="SPELLING_ERROR_737">Facebook</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_738">Twitter</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_739">Often</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_740">times</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_741">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_742">links</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_743">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_744">we</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_745">want</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_746">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_747">post</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_748">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_749">get</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_750">very</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_751">long</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_752">making</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_753">them</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_754">unwieldy</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_755">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_756">impossible</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_757">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_758">type</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_759">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_760">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_761">small</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_762">space</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_763">allotted</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_764">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_765">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_766">network</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_767">sites</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_768">To</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_769">get</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_770">around</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_771">this</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_772">third</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_773">party</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_774">services</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_775">such</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_776">as</span> http://tinyurl.com/ <span class="blsp-spelling-error" id="SPELLING_ERROR_777">or</span> http://bit.ly/ <span class="blsp-spelling-error" id="SPELLING_ERROR_778">will</span> “<span class="blsp-spelling-error" id="SPELLING_ERROR_779">encode</span>” <span class="blsp-spelling-error" id="SPELLING_ERROR_780">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_781">URL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_782">into</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_783">much</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_784">shorter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_785">version</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_786">example</span> - <a href="http://www.facebook.com/sauravhacker">http://www.facebook.com/sauravhacker</a> <span class="blsp-spelling-error" id="SPELLING_ERROR_787">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_788">turn</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_789">into</span> <a href="http://adf.ly/1PnMZ">http://adf.ly/1PnMZ</a><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_790">Although</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_791">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_792">benefit</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_793">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_794">URL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_795">shortening</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_796">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_797">obvious</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_798">there</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_799">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_800">also</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_801">security</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_802">risk</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_803">associated</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_804">with</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_805">it</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_806">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_807">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_808">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_809">shortened</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_810">URL</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_811">really</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_812">does</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_813">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_814">tell</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_815">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_816">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_817">true</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_818">destination</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_819">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_820">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_821">link</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_822">You</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_823">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_824">find</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_825">out</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_826">once</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_827">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_828">get</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_829">there</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_830">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_831">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_832">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_833">too</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_834">late</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_835">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_836">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_837">site</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_838">happens</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_839">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_840">contains</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_841">drive</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_842">by</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_843">malware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_844">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_845">content</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_846">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_847">should</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_848">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_849">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_850">viewed</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_851">by</span> “<span class="blsp-spelling-error" id="SPELLING_ERROR_852">sensitive</span>” <span class="blsp-spelling-error" id="SPELLING_ERROR_853">eyes</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_854">Therefore</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_855">make</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_856">certain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_857">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_858">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_859">click</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_860">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_861">shortened</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_862">URLs</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_863">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_864">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_865">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_866">trust</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_867">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_868">sender</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_869">Never</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_870">click</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_871">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_872">them</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_873">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_874">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_875">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_876">contained</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_877">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_878">spam</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_879">messages</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_880">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_881">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_882">sites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_883">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_884">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_885">have</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_886">any</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_887">reason</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_888">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_889">consider</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_890">suspicious</span>.<br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_891">You</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_892">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_893">use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_894">any</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_895">longurl</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_896">service</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_897">also</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_898">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_899">long</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_900">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_901">shortened</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_902">url</span>.<br /><br /><u style="color: red;"><span style="font-size: large;"><span class="blsp-spelling-error" id="SPELLING_ERROR_903">PROTECTION</span></span></u><br /><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_904">Use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_905">Different</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_906">Passwords</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_907">Change</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_908">Them</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_909">Often</span></b>: <span class="blsp-spelling-error" id="SPELLING_ERROR_910">Each</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_911">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_912">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_913">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_914">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_915">sites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_916">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_917">well</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_918">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_919">all</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_920">other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_921">important</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_922">websites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_923">should</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_924">have</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_925">different</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_926">complex</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_927">password</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_928">assigned</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_929">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_930">them</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_931">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_932">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_933">should</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_934">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_935">changed</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_936">regularly</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_937">Since</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_938">people</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_939">often</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_940">use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_941">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_942">same</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_943">password</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_944">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_945">multiple</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_946">sites</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_947">one</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_948">compromised</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_949">account</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_950">could</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_951">easily</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_952">lead</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_953">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_954">compromising</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_955">other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_956">accounts</span>.<br /><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_957">Don</span>’t <span class="blsp-spelling-error" id="SPELLING_ERROR_958">Blindly</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_959">Give</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_960">Out</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_961">Your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_962">Credentials</span></b>: <span class="blsp-spelling-error" id="SPELLING_ERROR_963">There</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_964">are</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_965">lot</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_966">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_967">third</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_968">party</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_969">web</span>-<span class="blsp-spelling-error" id="SPELLING_ERROR_970">based</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_971">services</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_972">out</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_973">there</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_974">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_975">make</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_976">use</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_977">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_978">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_979">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_980">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_981">services</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_982">In</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_983">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_984">past</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_985">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_986">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_987">way</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_988">for</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_989">this</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_990">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_991">occur</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_992">was</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_993">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_994">give</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_995">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_996">credentials</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_997">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_998">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_999">services</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_1000">This</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1001">works</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1002">so</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1003">long</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1004">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1005">these</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1006">third</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1007">party</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1008">services</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1009">weren</span>’t <span class="blsp-spelling-error" id="SPELLING_ERROR_1010">somehow</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1011">compromised</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1012">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1013">worse</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1014">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1015">services</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1016">were</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1017">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1018">what</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1019">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1020">seemed</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1021">to</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1022">be</span>.<br /><br /><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_1023">Keep</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1024">Your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1025">Operating</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1026">System</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1027">Browser</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1028">Patched</span></b>: <span class="blsp-spelling-error" id="SPELLING_ERROR_1029">Ensure</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1030">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1031">have</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1032">applied</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1033">all</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1034">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1035">latest</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1036">patches</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1037">from</span> Microsoft, <span class="blsp-spelling-error" id="SPELLING_ERROR_1038">Apple</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1039">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1040">whomever</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1041">supplies</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1042">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1043">computer</span>’s <span class="blsp-spelling-error" id="SPELLING_ERROR_1044">underlying</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1045">operating</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1046">system</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_1047">Ensure</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1048">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1049">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1050">using</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1051">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1052">latest</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1053">version</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1054">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1055">your</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1056">web</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1057">browser</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_1058">If</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1059">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1060">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1061">using</span> Internet <span class="blsp-spelling-error" id="SPELLING_ERROR_1062">Explorer</span>–<span class="blsp-spelling-error" id="SPELLING_ERROR_1063">especially</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1064">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1065">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1066">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1067">using</span> Internet <span class="blsp-spelling-error" id="SPELLING_ERROR_1068">Explorer</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1069">version</span> 6, <span class="blsp-spelling-error" id="SPELLING_ERROR_1070">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1071">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1072">standard</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1073">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1074">Windows</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1075">XP</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1076">try</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1077">using</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_1078">third</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1079">party</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1080">browser</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1081">such</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1082">as</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1083">Firefox</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1084">or</span> Google <span class="blsp-spelling-error" id="SPELLING_ERROR_1085">Chrome</span>.<br /><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_1086">Browser</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1087">Plugins</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1088">Can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1089">Help</span></b>: <span class="blsp-spelling-error" id="SPELLING_ERROR_1090">If</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1091">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1092">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1093">using</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1094">Firefox</span>, <span class="blsp-spelling-error" id="SPELLING_ERROR_1095">there</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1096">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1097">plugins</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1098">that</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1099">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1100">help</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1101">expand</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1102">those</span> “<span class="blsp-spelling-error" id="SPELLING_ERROR_1103">short</span>” <span class="blsp-spelling-error" id="SPELLING_ERROR_1104">URLs</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1105">so</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1106">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1107">can</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1108">see</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1109">where</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1110">it</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1111">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1112">they</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1113">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1114">take</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1115">you</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_1116">like</span> <a href="http://longurl.org/"><span class="blsp-spelling-error" id="SPELLING_ERROR_1117">LongURL</span></a><br /><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_1118">Antivirus</span>: </b><span class="blsp-spelling-error" id="SPELLING_ERROR_1119">Always</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1120">use</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_1121">updated</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1122">version</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1123">of</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1124">antivirus</span> / <span class="blsp-spelling-error" id="SPELLING_ERROR_1125">Anti</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1126">malware</span> / <span class="blsp-spelling-error" id="SPELLING_ERROR_1127">anti</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1128">rootkit</span> . <span class="blsp-spelling-error" id="SPELLING_ERROR_1129">The</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1130">updated</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1131">version</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1132">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1133">be</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1134">having</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1135">it</span>;s <span class="blsp-spelling-error" id="SPELLING_ERROR_1136">virus</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1137">database</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1138">updated</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1139">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1140">will</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1141">help</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1142">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1143">recognizing</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1144">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1145">deleting</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1146">those</span><b>.</b><br /><b><br /></b><br /><b><span class="blsp-spelling-error" id="SPELLING_ERROR_1147">Click</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1148">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1149">links</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1150">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1151">trust</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1152">from</span> - </b><span class="blsp-spelling-error" id="SPELLING_ERROR_1153">Always</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1154">click</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1155">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1156">links</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1157">if</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1158">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1159">got</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1160">from</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_1161">trusted</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1162">guy</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1163">because</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1164">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1165">other</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1166">links</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1167">may</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1168">contain</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1169">trojans</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1170">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1171">them</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1172">or</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1173">even</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1174">phishers</span>.<br /><br /><br /><span class="blsp-spelling-error" id="SPELLING_ERROR_1175">If</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1176">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1177">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1178">aware</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1179">about</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1180">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1181">Social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1182">Networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1183">Risks</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1184">you</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1185">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1186">secured</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1187">from</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1188">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1189">hacker</span>.<span class="blsp-spelling-error" id="SPELLING_ERROR_1190">It</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1191">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1192">not</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1193">that</span> i <span class="blsp-spelling-error" id="SPELLING_ERROR_1194">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1195">mentioned</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1196">about</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1197">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1198">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1199">Twitter</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1200">means</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1201">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1202">risks</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1203">are</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1204">only</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1205">on</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1206">them</span>. <span class="blsp-spelling-error" id="SPELLING_ERROR_1207">These</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1208">risks</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1209">exists</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1210">in</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1211">all</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1212">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1213">social</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1214">networking</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1215">sites</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1216">but</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1217">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1218">hackers</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1219">target</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1220">the</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1221">most</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1222">popular</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1223">which</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1224">now</span> a <span class="blsp-spelling-error" id="SPELLING_ERROR_1225">days</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1226">is</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1227">Facebook</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1228">and</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_1229">Twitter</span><br /></div><div style="text-align: center;"><br /></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-59598792745375822542011-06-10T17:29:00.000-07:002011-06-10T17:31:00.298-07:00Microsoft ships free malware cleaner that boots from CD or USB<p><a href="http://blogs.zdnet.com/security/?p=8712"></a>In a move aimed at cutting down on support call costs, Microsoft has released a malware recovery tool that boots from a CD or USB stick.</p> <p>The tool, currently in beta, is called Microsoft Standalone <a href="http://connect.microsoft.com/systemsweeper">System Sweeper</a>, and promises to help start an infected PC and perform an offline scan to help identify and remove rootkits and other advanced malware. <span id="more-8712"></span></p> <p>In addition, Microsoft says the System Sweeper utility can be used if you cannot install or start an antivirus solution on your PC, or if the installed solution can’t detect or remove malware on your PC.</p> <p>The company made it clear that the recovery tool is not a replacement for a full antivirus product.</p> <p>It is available for both 32-but and 64-bit Windows systems and uses the same antivirus engine as the Microsoft Security Essentials product.</p> <p>Just last month, the company shipped a free security tool called <a href="http://www.microsoft.com/security/scanner/en-us/default.aspx">Microsoft Safety Scanner</a> to offer on-demand scanning to helps remove viruses, spyware, and other malicious software. The safety scanner works with existing antivirus software.</p> <p>These utilities are a big part in helping Microsoft to cut down on support costs stemming from malware infections.</p>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-52529287719629539882011-06-10T17:26:00.000-07:002011-06-10T17:29:05.223-07:00Android becomes second most popular malware haven in Q1<div style="text-align: center;"><br /></div><p><b>T</b>he first quarter was the most active in malware history and mobile attacks are moving to the forefront, according to McAfee data. Android attacks are also picking up.</p> <p><a href="http://www.businesswire.com/news/home/20110531007227/en/McAfee-Q1-Threats-Report-Reveals-Surge-Malware">McAfee’s first quarter threat report</a> noted that attacks surged in the first quarter, but spam has fallen. In fact, there were 6 million unique malware samples in the first quarter, the highest ever for the first three months of the year. February had the most new malware samples—2.75 million.</p> <p>Fake anti-virus software—think Mac Defender—reached its highest levels in march with</p><p> 350,000 unique samples.</p> <p>As for emerging threats, McAfee noted that Android devices are becoming malware havens. Android was the second most popular environment for mobile malware behind Symbian in the first quarter. Historically, Android remains No. 3.</p><p><img src="http://i.zdnet.com/blogs/mcf060111a.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 586px; height: 433px;" border="0" alt="" /></p><p><br /></p><p><br /></p><p></p><p><a href="http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2011.pdf">In its report, McAfee said</a>:</p> <blockquote> <p>McAfee Labs combats several developing families of malware that attack Android phones. One of the families, Android/DrdDream, comprises a variety of legitimate games and apps that have been injected with malicious code. These threats are unique and quite dangerous due to the use of two root exploits to gain greater control of those phones. The two exploits—Exploit/LVedu and Exploit/DiutesEx—were initially used by users trying to gain legitimate root access to their own devices, a process commonly referred to as rooting.1 In the PC world, malware often uses exploits to enable drive-by downloads that infect machines visiting specially designed or compromised websites. For mobile devices, much of the malware has required user interaction, but in the near future mobile exploits will certainly allow automatic malware installation. Like Android/DrdDream, the Android/Drad family is made up of maliciously modified applications.</p> <p>This family sends device information to an attacker-controlled site. Just like in the PC malware world, Android/Drad listens for commands from the attacker. The malware can also download additional software, though it stops short of being a full-fledged mobile botnet. It appears that the malware uses blackhat search-engine optimization techniques, a process of manipulating search engine results to place dangerous sites higher than they should appear in lists of hits.</p></blockquote><p></p><p><br /></p>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-69596500666701413192011-06-07T20:13:00.000-07:002011-06-07T20:25:42.784-07:00About World IPv6 Day....Future.Today<a href="http://www.worldipv6day.org/files/2011/05/IPv6-test-flight-blue-256-trans.png"><img style="MARGIN: 0px 10px 10px 0px; WIDTH: 191px; FLOAT: left; HEIGHT: 193px; CURSOR: hand" border="0" alt="" src="http://www.worldipv6day.org/files/2011/05/IPv6-test-flight-blue-256-trans.png" /></a><br /><br /><br /><br /><br /><br /><br /><div><strong></strong></div><br /><br /><br /><br /><br /><div><strong></strong></div><br /><br /><div><strong></strong></div><br /><div><strong></strong></div><br /><br /><div><strong>Happy IPv6 Dya to all.!!!</strong> </div><br /><br /><div>On 8 June, 2011, <a href="http://googleblog.blogspot.com/2011/01/world-ipv6-day-firing-up-engines-on-new.html" target="_blank">Google</a>, <a href="http://www.facebook.com/notes/facebook-engineering/world-ipv6-day-solving-the-ip-address-chicken-and-egg-challenge/484445583919" target="_blank">Facebook</a>, <a href="http://www.yahoo.com/" target="_blank">Yahoo!</a>, <a href="http://www.akamai.com/ipv6" target="_blank">Akamai</a> and <a href="http://blog.llnw.com/2011/01/ready-to-celebrate-world-ipv6-day-we-are/" target="_blank">Limelight Networks</a> will be amongst some of the <a href="http://www.worldipv6day.org/participants/index.html">major organisations</a> that will offer their content over IPv6 for a 24-hour “test flight”. The goal of the Test Flight Day is to motivate organizations across the industry – Internet service providers, hardware makers, operating system vendors and web companies – to prepare their services for IPv6 to ensure a successful transition as IPv4 addresses run out.</div><br /><br /><div><br /><br /><br /><p>The story begins in 1977, when <a href="http://en.wikipedia.org/wiki/Vint_Cerf">Vint Cerf</a>, the program manager for the ARPA Internet research project (and now one of the driving forces behind Google’s IPv6 efforts), chose a 32-bit address format for an experiment in packet network interconnection. Who would have thought that the experiment would evolve into today’s Internet: a global network connecting billions of people, some using handheld devices faster than the mainframes of the 1970s?<br /><br />For more than 30 years, 32-bit addresses have served us well, but now the Internet is running out of space. IPv6 is the only long-term solution, but as the chart below shows, it has not yet been widely deployed. With IPv4 addresses expected to <a href="http://www.potaroo.net/tools/ipv4/index.html">run out in 2011</a>, only <a href="http://www.google.com/intl/en/ipv6/statistics/">0.2% of Internet users</a> have native IPv6 connectivity:</p><img style="TEXT-ALIGN: center; MARGIN: 0px auto 10px; WIDTH: 594px; DISPLAY: block; HEIGHT: 256px; CURSOR: hand" border="0" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheTRKAPIxmEf7OExD2VniThEYGjn0IxKZ0OePvu92pIY6NiwXZqGBvjlrS_LTF6Gipf0c70RRonBTzuyZaO2mHpi1ruXhLzWuwHhKjzOwbhZDycCL1bP1LoCmBLR_58ZqYLuVyxF14Tc8/" /><strong>Test your IPv6 Connectivity</strong></div><br /><br /><div>Want to find out your IPv6 readiness? Use this <a href="http://test-ipv6.com/" target="_blank">test</a>.<br /><br /><br /><br /><br /><br /><p><br /></p></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-85465378986544480832011-06-04T23:55:00.000-07:002011-06-05T00:01:58.606-07:00Some of Japanese phases..!<div><strong>ohisashiburi desu</strong><br />It's been a long time since we met.</div><div><strong><br />dou shita no</strong><br />what happened?<br /><br /><strong>kura desu ka?</strong><br />How much is it?<br /><br /></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-24872704358240215322011-05-27T16:04:00.000-07:002011-05-27T16:10:44.187-07:00Google Summer of Code: Where are the students?Google Summer of Code is truly a global program. For this year’s program we received 5,651 applications from 3,731 students in 97 countries.<br /><br />google accepted 1,115 students from 68 countries. The ten countries with the highest number of accepted students are represented in the pie chart below.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/-xHKdLr_zcbI/TdV2btHhyoI/AAAAAAAAADg/9xelCmGwd5U/s400/graph%2B%25281%2529.png"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 309px;" src="http://3.bp.blogspot.com/-xHKdLr_zcbI/TdV2btHhyoI/AAAAAAAAADg/9xelCmGwd5U/s400/graph%2B%25281%2529.png" border="0" alt="" /></a>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-25869258154945506292010-02-12T02:45:00.000-08:002010-02-12T03:12:22.374-08:00China shuts down cracker website<span style="font-size:85%;">The Chinese authorities have shut down what they describe as the biggest training website for hackers in China. The </span><a href="http://www.chinadaily.com.cn/" target="_blank" rel="external"><span style="font-size:85%;">China Daily</span></a><span style="font-size:85%;"> newspaper on Monday reported that three of the people behind the "Black Hawk Safety Net" site have been arrested. The group is said to have offered software and assistance for cracker attacks over the web. Since 2005, the website has acquired 12,000 members, paying out 7 million yuan (approximately £650,000) in membership fees. According to China Daily, 170,000 users were registered with the site.</span>
<br /><span style="font-size:85%;">
<br />The police began investigating the site in 2007, when a number of Black Hawk members were connected to an attack on the municipality of Macheng in Hubei province. News of the shutdown comes against the backdrop of a dispute with the USA over an </span><a href="http://www.h-online.com/news/item/Google-considers-closing-its-Chinese-operation-903601.html"><span style="font-size:85%;">attack on US internet giant Google</span></a><span style="font-size:85%;">. Google claims that the attacks originated in China. The Beijing government has rejected the allegations, </span><a href="http://www.h-online.com/news/item/China-denies-involvement-in-attacks-on-Google-912636.html"><span style="font-size:85%;">stating</span></a><span style="font-size:85%;"> that it is itself the biggest victim of online attacks and takes stern measures against crackers.</span>
<br /></span><span style="font-size:85%;">
<br />China Daily quotes a 23-year old Black Hawk member as saying, "I could download trojan programs from the site which allowed me to control other people's computers." Courses cost between 100 and 2000 yuan (approximately £9 and £187). "I did this just for fun but I also know that many other members could make a fortune by attacking other people's accounts." In Chinese press reports the talk has largely been of attacks on private access data for games and other entertainment websites and on e-mail and chat rooms. A 20-year old student told China Daily, "Basically students were told how to steal accounts and use trojan programs."</span>
<br />Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-10398658484490308172010-02-12T02:39:00.000-08:002010-02-12T02:42:35.193-08:00Hacker extracts crypto key from TPM chip<a href="http://www.h-online.com/imgs/43/4/7/9/7/5/4/logo-en-32d44e61eccfbef8.gif"><img style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 124px; CURSOR: hand; HEIGHT: 62px" alt="" src="http://www.h-online.com/imgs/43/4/7/9/7/5/4/logo-en-32d44e61eccfbef8.gif" border="0" /></a><br /><div><span style="font-size:85%;">An American hacker has, with a great deal of effort, managed to crack a Trusted Platform Module (TPM) by Infineon. He was able to read the data stored on the TPM chip, for instance cryptographic keys (RSA, DES) such as those also used by Microsoft's BitLocker on appropriate motherboards. </span></div><span style="font-size:85%;"><div><br />TPM hardware incorporates various levels of logical as well as physical measures designed to counter a range of attacks, such as differential electromagnetic analyses (DEMA) and even physical intrusions. Once the keys are retrieved, however, an attacker can read the encrypted data stored on a hard disk without needing a password. </div><div><br />Previously known as the smart card hacker, Christopher Tarnovsky of Flylogic Engineering has presented his work at the Black Hat DC security conference. He apparently managed to suss out a processor in the "SLE 66CLX360PE" family used in the TPM. For this purpose, he extracted the actual chip from the housing in his special lab using various procedures that involved liquids and gases (a video about this is available online).<br />He then worked his way through the different layers of the chip using, for instance, a Focused Ion Beam microscope and Photoshop to figure out the chip's structure and find a way into the heart of the TPM. </div><div> </div><div></div><div>Subsequently, he analysed the on-chip signalling pathways to obtain access to the processor's data bus. This took Tarnovsky the better part of six months and numerous TPM chips. However, retrieving the license key of an XBox 360, which also contains Infineon's TPM, apparently only required an additional six hours.<br />While Tarnovsky says that Infineon has so far said such attacks just weren't feasible, Peter Laackmann, Infineon's Senior Principal for Chip Cards & Product Security, in an interview with The H's associates at heise Security, denied this is the case. </div><div>The executive said that Infineon does not rule out the possibility of successful attacks. Laackmann said that TPM chips are not uncrackable and are not advertised as such. The potential for such an attack was already evident in an earlier evaluation phase and had apparently been carried out successfully by company researchers, quite some time ago. </div><div></div><div>However, one mustn't neglect the effort involved in such an attack, said Laackmann, adding that even Tarnovsky himself admits that the necessary steps aren't easy to reproduce and require a considerable amount of special equipment. According to Tarnovsky, the required lab equipment represents an investment of about $200,000.<br />Laackmann also said that the product family has become obsolete, and that the cracked processor was only intended for smart cards. There is a new generation of TPM chips based on the SLE78 family, which apparently offers not only further physical anti-intrusion measures, but also additional cryptographic features. In these chips, recording data bus traffic after breaking into the housing is said to be ineffective because the data is encrypted. Infineon's Integrity Guard concept is designed to avoid the transmission and processing of plain text data altogether. However, so far, few devices incorporate these new chips. </div><div><br />The hack's potential consequences for the many TPM-protected systems in corporate environments, for instance, are difficult to predict. One can hardly assume that criminals will reproduce such attacks on a practical level in the medium term. However, intelligence agencies could use the technology in targeted attacks – perhaps they are doing so already. Tarnovsky does not intend to publish the details of his approach – but he is also a business man. He plans to test the security of other vendors' TPMs in the near future.<br /></div></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-20553729409281510272010-02-05T21:24:00.000-08:002010-02-05T21:35:56.932-08:00David Litchfield<a href="http://www.davidlitchfield.com/dwl.jpg"><img style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 179px; CURSOR: hand; HEIGHT: 269px" alt="" src="http://www.davidlitchfield.com/dwl.jpg" border="0" /></a><br /><div><span style="font-size:85%;"></span></div><br /><div><span style="font-size:85%;"></span> </div><div><span style="font-size:85%;"></span> </div><div><span style="font-size:85%;">David Litchfield is recognized as one of the world's leading authorities on database security. He is the author of Oracle Forensics, the Oracle Hacker's Handbook, the Database Hacker's Handbook and SQL Server Security and is the co-author of the Shellcoder's Handbook. He is a regular speaker at a number of computer security conferences and has delivered lectures to the National Security Agency, the UK's Security Service, GCHQ and the Bundesamt für Sicherheit in der Informationstechnik in Germany. David is a CHECK team leader and holds SC clearance.<br />In 2003 David was voted as the "Best Bug Hunter" by Information Security Magazine. He has found and help to fix 24 security flaws in SQL Server, including the vulnerability that was exploited by Slammer, 17 in IBM's DB2, 22 in Informix and over 100 in Oracle. In February 2008 David discovered a new class of vulnerability in Oracle that can lead to "Lateral SQL Injection" and, in the November of 2006, another new class of vulnerability in the same RDBMS that can lead to "cursor snarfing" attacks. Both are general programming flaws, that can lead to data compromise. David pioneered major advancements in Oracle forensics and has authored 6 technical papers since March 2007 on the topic. </span></div><br /><span style="font-size:85%;"><div><br />David is Chief Research Scientist at NGSSoftware, a UK computer security services and software company he founded in 2001. NGSSoftware was acquired by NCC Group in November 2008. In 2007 NGSSoftware was awarded the Queen's Award for Enterprise, and was listed as one of the UK's fasted growing tech companies by both Deloitte and the Sunday Times. NGSSoftware was winner in the Best Security Company category in the 2008 European SC Magazine Awards and runner up in 2007. Previously David was Director of Research at @stake after his first company, Cerberus Information Security, was acquired in July 2000.<br />In May, David was named the "Entrepreneur of the Year" at the South London Business Awards 2008.<br />Prior to starting a career in computer security David competed as a track and field athlete for Scotland. He was the Scottish Under 20 Champion for both the long jump and decathlon and is the holder of the Scottish Schools Indoor record for long jump.<br /><span style="font-size:78%;">Source: http://www.davidlitchfield.com</span></div></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-26931302484417146402010-02-04T22:15:00.000-08:002010-02-04T22:22:38.188-08:00Report: Google to work with NSA over cyberattacks<a href="http://www.h-online.com/imgs/43/4/7/7/1/5/2/nsa-seal.jpg-e9ea30f9a7bd6230.jpeg"><span style="font-size:85%;"><img style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 200px; CURSOR: hand; HEIGHT: 200px" alt="" src="http://www.h-online.com/imgs/43/4/7/7/1/5/2/nsa-seal.jpg-e9ea30f9a7bd6230.jpeg" border="0" /></span></a><span style="font-size:85%;"><br /></span><div> </div><div><span style="font-size:85%;"></span> </div><div><span style="font-size:85%;">According to a </span><a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/02/03/AR2010020304057.html" target="_blank" rel="external"><span style="font-size:85%;">report</span></a><span style="font-size:85%;"> from The Washington Post, following the recent massive cyber attacks originating in China, Google will be working with the United States </span><a href="http://www.nsa.gov/" target="_blank" rel="external"><span style="font-size:85%;">National Security Agency</span></a><span style="font-size:85%;"> (NSA). Under the agreement, which has yet to be finalised, the NSA will help Google analyse the information gathered from the recent attacks and will help to investigate and defend against future attacks on the company's networks. The report goes on to say that "the deal does not mean the NSA will be viewing users' searches or e-mail accounts, or that Google will be sharing proprietary data". Neither Google, nor the NSA have confirmed theWashington Post report.</span></div><div><span style="font-size:85%;"><br />Google had </span><span style="font-size:85%;">announced</span><span style="font-size:85%;"> in mid-January that hackers based in China had attempted to gain access to the email accounts of several Chinese human rights activists and had stolen important source code that could potentially allow access to other data. Following the attacks, the company said that it was no longer prepared to bow to Chinese censorship, that it is considering withdrawal from the world's largest and fastest-growing internet market and closing down Google.cn and its Chinese office. Google has already received the backing of the US government, however, China has denied any involvement in the attacks.<br />Created by President Truman in November of 1952, the NSA is the largest intelligence service in the US. Approximately 120,000 soldiers and civilians from around the world work for the agency. In 2005, it was </span><a href="http://en.wikipedia.org/wiki/NSA_warrantless_surveillance_controversy"><span style="font-size:85%;">revealed</span></a><span style="font-size:85%;"> that the NSA had been tapping the telephones of its own citizens.</span></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-51772229045038373632010-02-04T22:10:00.000-08:002010-02-04T22:13:37.706-08:00Microsoft confirms new vulnerability in Internet Explorer<a href="http://www.h-online.com/imgs/43/4/7/7/0/0/5/ie8_logo200.jpg-e2b86a389ceb3b92.jpeg"><span style="font-size:85%;"><img style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 199px; CURSOR: hand; HEIGHT: 200px" alt="" src="http://www.h-online.com/imgs/43/4/7/7/0/0/5/ie8_logo200.jpg-e2b86a389ceb3b92.jpeg" border="0" /></span></a><span style="font-size:85%;"> </span><br /><span style="font-size:85%;"></span><br /><span style="font-size:85%;">Microsoft has confirmed the existence of a security vulnerability revealed at the </span><a href="http://www.blackhat.com/html/bh-dc-10/bh-dc-10-home.html"><span style="font-size:85%;">Black Hat DC</span></a><span style="font-size:85%;"> security conference on Tuesday and itself issued a warning. The vulnerability allows a crafted website to access and read the content of arbitrary files on a PC. Although an attacker needs to know the specific path and file name, for a standard Windows installation these are usually known default paths.<br />All versions of Internet Explorer from 5.01 to 8 on all supported Windows platforms are reportedly affected. Windows XP Home users, however, appear to be unaffected by the problem, as XP Home does not include a hidden C$ administrative share for websites to access. For Internet Explorer 7 and 8 running under Windows 7, Vista or Server 2003/2008, the vulnerability cannot be exploited as long as protected mode is activated in the browser (as it is by default).<br />Microsoft has said that it is looking into how it can solve the problem. However, solving it is not going to be straightforward, as Jorge Luis Alvarez Medina of Core Security Technologies, who discovered the vulnerability, has repeatedly stressed. The crux of the problem is that security zone settings in Internet Explorer do not always bite if a path is entered in the browser in UNC (Uniform Naming Convention) format (e.g. file://127.0.0.1/C$/.../index.dat). This means that under specific conditions JavaScript from the Internet Zone can access (and render) local files, despite the zone model being intended to prevent this.<br />Core Security reported two similar cross-domain vulnerabilities to Microsoft in 2008 and 2009, for which Microsoft released updates. However, until now, Microsoft has always merely patched things up, without addressing the actual core problem. As a result Medina has been able to discover a new means of reading local files. To overcome the hurdles set up by Microsoft, he takes advantage of a bug in the way the MIME type of local files is determined and a weakness when processing OBJECT tags.</span><br /><span style="font-size:85%;"><br />As an interim solution, Microsoft has released a </span><a href="http://support.microsoft.com/kb/980088" target="_blank" rel="external"><span style="font-size:85%;">downloadable fix-it tool</span></a><span style="font-size:85%;"> which disables the Internet Explorer file protocol. This could, however, cause problems for some other applications.<br /><br /></span><span style="font-size:85%;"></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-14291803841584250282010-02-02T21:37:00.000-08:002010-02-02T21:39:14.127-08:00China: We are biggest victim of hacking<span style="font-size:85%;">China has denied any role in alleged cyberattacks on Indian government offices, calling China itself the biggest victim of hackers.<br />When asked about Google's allegation that cyberattacks launched from China hit the US search giant, foreign ministry spokesman Ma Zhaoxu said Chinese companies were also often hit by cyberattacks.<br />"China is the biggest victim of hacking attacks," Ma said, citing the example of top Chinese search engine Baidu.com being hacked last week.</span><br /><span style="font-size:85%;"></span><br /><span style="font-size:85%;">Google last week said it might exit China after being hit by recent hacking attempts largely aimed at accessing the Gmail accounts of Chinese human rights activists. It also said it planned to hold talks with Chinese authorities about whether it could offer an uncensored version of its local search engine.<br />Ma said he did not know if Chinese authorities had started talks with Google. A Google spokeswoman did not confirm a Bloomberg news report that Google and China had already started the talks. "That's not what we've been saying," she said in an email.<br />An Indian official has reportedly said local government offices including that of India's National Security Advisor were also targeted last month by hackers believed to be from China.</span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-50010115490167973022010-02-02T21:03:00.000-08:002010-02-02T21:06:30.763-08:00Google invites attacks on Chrome<a href="http://www.h-online.com/imgs/43/4/7/4/8/2/9/Chrome_Crosshairs_80-56fed92948d10971.png"><span style="font-size:85%;"><img style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 83px; CURSOR: hand; HEIGHT: 80px" alt="" src="http://www.h-online.com/imgs/43/4/7/4/8/2/9/Chrome_Crosshairs_80-56fed92948d10971.png" border="0" /></span></a><span style="font-size:85%;"><br /></span><div> </div><div><span style="font-size:85%;">Google has launched an experimental programme to encourage external security researchers to find and report vulnerabilities in its browser. Borrowing from the Mozilla Foundation's 2004 Security Bug Bounty Program, $500 will be awarded for each bug found. In special cases, a committee will decide whether to increase the amount to a maximum of $1,337 – however, this reward is only for vulnerabilities which are particularly critical, or particularly smart reports on vulnerabilities and their exploitation.<br />According to Google, it doesn't matter whether the vulnerability is in the open source </span><a href="http://dev.chromium.org/" target="_blank" rel="external"><span style="font-size:85%;">Chromium</span></a><span style="font-size:85%;"> version or the binary </span><a href="http://www.google.com/chrome" target="_blank" rel="external"><span style="font-size:85%;">Chrome</span></a><span style="font-size:85%;"> version. The two differ only </span><a href="http://blog.chromium.org/2008/10/google-chrome-chromium-and-google.html"><span style="font-size:85%;">marginally</span></a><span style="font-size:85%;"> anyway – Chrome additionally contains GoogleUpdater and sends an </span><a href="http://www.google.com/support/chrome/bin/answer.py?answer=107684" target="_blank" rel="external"><span style="font-size:85%;">RLZ parameter</span></a><span style="font-size:85%;"> which is forwarded to Google when a search term is entered in the Chrome address bar. The company will not be offering rewards for reports of bugs in third-party plug-ins.<br />Google is hoping that this will improve the security of its browser and therefore security for its users. Any bug found can be reported via the bug tracking system. Further information and a list of Q&As can be found in Google's </span><a href="http://blog.chromium.org/2010/01/encouraging-more-chromium-security.html" target="_blank" rel="external"><span style="font-size:85%;">blog entry</span></a><span style="font-size:85%;"> announcing the programme</span></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-55260992483393092572010-02-02T20:53:00.000-08:002010-02-02T20:56:42.773-08:00Windows hole discovered after 17 years<a href="http://www.microsoft.com/en/gb" target="_blank" rel="external"><span style="font-size:85%;">Microsoft</span></a><span style="font-size:85%;"> isn't having an easy time of it these days. In addition to the </span><span style="font-size:85%;">unpatched hole in Internet Explorer</span><span style="font-size:85%;">, a now published hole in Windows allows users with restricted access to escalate their privileges to system level – and this is believed to be possible on all 32-bit versions of Windows from Windows NT 3.1 up to, and including Windows 7. While the vulnerability is likely to affect home users in only a minor way, the administrators of corporate networks will probably have their hands full this week.</span><br /><span style="font-size:85%;"></span><br /><span style="font-size:85%;">The problem is caused by flaws in the </span><a href="http://en.wikipedia.org/wiki/Virtual_DOS_machine"><span style="font-size:85%;">Virtual DOS Machine</span></a><span style="font-size:85%;"> (VDM) introduced in 1993 to support 16-bit applications (real mode applications for 8086). VDM is based on the Virtual 8086 Mode (VM86) in 80386 processors and, among other things, intercepts hardware routines such as BIOS calls. Google security team member Tavis Ormandy has found several vulnerabilities in this implementation that allow an unprivileged 16-bit program to manipulate the kernel stack of each process via a number of tricks. This potentially enables attackers to execute code at system privilege level.</span><br /><br /><span style="font-size:85%;">The workaround requires users to start the </span><a href="http://en.wikipedia.org/wiki/Group_Policy"><span style="font-size:85%;">group policy</span></a><span style="font-size:85%;"> editor and enable the "Prevent access to 16-bit applications" option in the Computer Configuration\Administrative Templates\Windows Components\Application Compatibility section. When tested with these settings by the heise Security team, the exploit no longer functioned. The settings reportedly don't cause any major compatibility problems for most users while no 16-bit applications are being used.</span><br /><span style="font-size:85%;"><br /><strong>Update</strong> - The above option is only available through the group policy editor on Windows 2003 systems. Some versions of Windows do not include a group policy editor. As an alternative, users can also create a registry key under \HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppCompat with a D-Word value of VDMDissallowed = 1. Under Windows XP, to prevent the system from being vulnerable to the exploit, users can place the following text:<br />Windows Registry Editor Version 5.00<br />[HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\AppCompat]<br />"VDMDisallowed"=dword:00000001<br />into a file called vdmdisallow.reg and double click the file. Windows will then automatically import the key (admin rights are required to perform this action).</span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-47594979300396304982010-01-23T12:53:00.000-08:002010-01-23T12:54:32.837-08:00Twitter disables ‘widget’ function<span style="font-size:85%;"><span style="font-size:180%;">T</span>witter has temporarily disabled one of the features on its website after a security researcher warned of a programming flaw that left the login credentials of its users vulnerable to hackers. </span><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 250px; CURSOR: hand; HEIGHT: 101px; TEXT-ALIGN: center" alt="" src="http://www.khaleejtimes.com/images/twitter_23012010in.jpg" border="0" /> <p><span style="font-size:85%;"></p></span><span style="font-size:85%;"><div>Twitter co-founder Biz Stone said in an email that the company had temporarily cut off access to a feature that lets users display Twitter updates on their websites by using Flash technology.<br />“Our team has disabled the Flash widget while we look into the problem,” Stone said.<br />Mike Bailey, a senior security analyst with Foreground Security of Orlando, Florida, said that the problem exploits a widely known vulnerability in Adobe Systems Inc’s Flash programming language.<br />Adobe has told programmers how to address the vulnerability, which was first discovered in 2006, Bailey added, but noted the operators of many websites have failed to respond to those warnings.<br />The microblogging site’s huge popularity has made it a prime target for hackers looking to spread malicious software to Twitter’s millions of users.<br />“As simple as the attack is, I’ve been finding them all over the place,” Bailey said.<br />Officials with Adobe declined to comment.<br />A hacker last month briefly hijacked the Twitter site and redirected it to one that claimed to represent a group calling itself the Iranian Cyber Army. That high-profile attack — by a perpetrator who stole credentials to the account that Twitter uses to route its traffic — did not compromise credentials of any Twitter users.<br />Bailey said his analysis of the Twitter site showed that it could have been vulnerable to attacks for more than a year, but that it was impossible to know whether hackers had actually exploited the Adobe flaw.<br />He is scheduled to discuss his research on the Twitter flaw at the Black Hat DC security research conference in Washington, which begins on Feb. 2. </span></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-23653789120431791202010-01-23T12:43:00.000-08:002010-01-23T12:45:02.636-08:00Motorola seeks to ban BlackBerryThe patents relate to some early-stage innovations developed by Motorola in key areas such as Wi-Fi access, application management<br /><br /><span style="font-size:85%;">Motorola Inc is seeking to ban imports of Research In Motion Ltd's BlackBerry smartphones into the US that it claims infringe its patents.<br />Motorola, the largest US mobile-phone maker, said it filed a complaint with the US International Trade Commission, citing unfair trade practices and infringement of five patents.<br />The patents relate to some early-stage innovations developed by Motorola in key areas such as Wi-Fi access, application management, user interface and power management, that are now being used by RIM, Motorola said in a statement. The technology allows better connectivity at a lower cost, the company claims.<br /><span style="font-size:100%;"><strong></strong></span></span><br /><span style="font-size:85%;"><span style="font-size:100%;"><strong>Litigation</strong></span><br />"We've not been able to convince RIM over two years in litigation elsewhere to reach a reasonable settlement so we've taken it to the ITC to stop its infringement," Jonathan Meyer, Motorola's senior vice president of intellectual property law, said in an interview.<br />He said the two companies had a licence agreement in place from 2003 to 2007 and haven't been able to reach terms since then. Motorola and RIM have been suing each other in recent years.</span><br /><span style="font-size:78%;"></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-40717659895805908022010-01-14T09:17:00.000-08:002010-01-14T09:33:42.240-08:00Surge in e-crimes in Dubai<span style="font-size:85%;">Sixty-two per cent of <span class="blsp-spelling-error" id="SPELLING_ERROR_0">phishing</span> in the <span class="blsp-spelling-error" id="SPELLING_ERROR_1">UAE</span> last year targeted local banks<br />Surge in e-crimes in <span class="blsp-spelling-error" id="SPELLING_ERROR_2">DubaiSixty</span>-two per cent of <span class="blsp-spelling-error" id="SPELLING_ERROR_3">phishing</span> in the <span class="blsp-spelling-error" id="SPELLING_ERROR_4">UAE</span> last year targeted local banks<br />By <span class="blsp-spelling-error" id="SPELLING_ERROR_5">Sharmila</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_6">Dhal</span>, Senior Reporter Published</span><br /><span style="font-size:85%;">Dubai Most <span class="blsp-spelling-error" id="SPELLING_ERROR_13">cyber</span> attacks in the <span class="blsp-spelling-error" id="SPELLING_ERROR_14">UAE</span> last year targeted banks and were perpetrated by electronic criminals from outside the country, a government report has revealed, adding that the number of hacking and defacement incidents quadrupled in 2009 from 2008.<br />It added that of all the electronic breaches during 2009, "<span class="blsp-spelling-error" id="SPELLING_ERROR_15">phishing</span>" comprised the main offence - 62 per cent of which targeted local banks, followed by <span class="blsp-spelling-error" id="SPELLING_ERROR_16">UAE</span> branches of international banks and other institutions at 19 per cent each.</span><br /><span style="font-size:85%;"><br /><strong><span style="font-size:100%;">Emergency plan</span></strong><br />The report was presented by Mohammad <span class="blsp-spelling-error" id="SPELLING_ERROR_17">Geyath</span>, Executive Director, Technology Development Affairs, <span class="blsp-spelling-error" id="SPELLING_ERROR_18">Telecom</span> Regulatory Authority (<span class="blsp-spelling-error" id="SPELLING_ERROR_19">TRA</span>), at the Crises and Emergency Management Conference in <span class="blsp-spelling-error" id="SPELLING_ERROR_20">Abu</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_21">Dhabi</span> which concluded on Wednesday. The report was put together by the Computer Emergency Response Team (CERT), a consultative body that advises <span class="blsp-spelling-error" id="SPELLING_ERROR_22">TRA</span>. The total number of <span class="blsp-spelling-error" id="SPELLING_ERROR_23">cyber</span>-related offences recorded by CERT was 51 in 2009, up from 47 in 2008, while incidents of <span class="blsp-spelling-error" id="SPELLING_ERROR_24">phishing</span> and defacement had increased to 26 in 2009, from six in 2008.<br />Meanwhile, the <span class="blsp-spelling-error" id="SPELLING_ERROR_25">TRA</span> announced at the conference an Emergency Plan for the country's <span class="blsp-spelling-error" id="SPELLING_ERROR_26">telecom</span> sector. Making the announcement Mohammad Nasser Al <span class="blsp-spelling-error" id="SPELLING_ERROR_27">Ganem</span>, Director-General of <span class="blsp-spelling-error" id="SPELLING_ERROR_28">TRA</span>, said the plan has been developed in co-operation with the National Crisis and Emergency Management Authority (<span class="blsp-spelling-error" id="SPELLING_ERROR_29">NCEMA</span>) and in consultation with key stake-holders, <span class="blsp-spelling-error" id="SPELLING_ERROR_30">telecom</span> operators and service providers.<br />Designed to protect critical infrastructure for communications, the plan encompasses various stages to deal with crises which cover all aspects of security and protection on the one hand and the preservation of a sustainable network during emergencies on the other.<br />Earlier, Richard Clarke, former security adviser to the US government, said of all the future risks that the world faces today, the threat of a <span class="blsp-spelling-error" id="SPELLING_ERROR_31">cyber</span> war could not be wished away, just as the potential crises arising out of climate change and pandemic diseases.<br /><br /><span style="font-size:100%;"><strong>Global issue</strong></span><br />He said nations need to ask themselves what national functions depend on cyberspace and conduct an analysis of the risks such utilities as power, water, banking, airports and oil supplies face.<br />He said countries should spend time to put audits and back-up systems in place to meet any contingency.<br />"Somewhere on the curve of low probability and high consequence, we should be prepared to spend time on these matters," he said, pointing to <span class="blsp-spelling-error" id="SPELLING_ERROR_32">cyber</span> wars in some parts of the world like Estonia and Georgia.<br /><br /><span style="font-size:100%;"><strong><span class="blsp-spelling-error" id="SPELLING_ERROR_33">Telecom</span> Emergency Plan Announced</strong></span><br />Meanwhile the <span class="blsp-spelling-error" id="SPELLING_ERROR_34">TRA</span> has announced an Emergency Plan for the country's <span class="blsp-spelling-error" id="SPELLING_ERROR_35">telecom</span> sector.<br />Making the announcement at the concluding day of the Crises and Emergency Management Conference in <span class="blsp-spelling-error" id="SPELLING_ERROR_36">Abu</span> <span class="blsp-spelling-error" id="SPELLING_ERROR_37">Dhabi</span> on Wednesday, Mohammad Nasser Al <span class="blsp-spelling-error" id="SPELLING_ERROR_38">Ganem</span>, Director-General of <span class="blsp-spelling-error" id="SPELLING_ERROR_39">TRA</span>, said the plan has been developed in co-operation with the National Crisis and Emergency Management Authority (<span class="blsp-spelling-error" id="SPELLING_ERROR_40">NCEMA</span>) and in consultation with key stake-holders, <span class="blsp-spelling-error" id="SPELLING_ERROR_41">telecom</span> operators and service providers.<br />Designed to protect critical infrastructure for communications, the plan encompasses various stages to deal with crises which cover all aspects of security and protection on the one hand and the preservation of a sustainable network during emergencies on the other.<br />The stages covered include prevention, preparedness, response and recovery.<br />Earlier, Richard Clarke, former security adviser to the United States government, said of all the future risks that the world faces today, the threat of a <span class="blsp-spelling-error" id="SPELLING_ERROR_42">cyber</span> war could not be wished away, just as the potential crises arising out of climate change and pandemic diseases.<br />He said nations need to ask themselves what national functions depend on cyberspace and conduct an analysis of the risks such utilities as power, water, banking, airports and oil supplies face.<br />He said countries should spend time to put audits and back-up systems in place to meet any contingency. "Somewhere on the curve of low probability and high consequence, we should be prepared to spend time on these matters," he said, pointing to <span class="blsp-spelling-error" id="SPELLING_ERROR_43">cyber</span> wars that had proven to be a reality in some parts of the world like Estonia and Georgia.<br /><br /><br /></span><span style="font-size:85%;"></span><span style="font-size:85%;"></span>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-50959753381413342312009-10-28T07:13:00.000-07:002009-10-28T07:17:38.816-07:00Microsoft Office 2010 Beta 2 Leaks, Public Beta Expected in November<a href="http://www.geeksmack.net/content_media/AnotherOffice2010LeaksBetaExpectedinNove_72/Office2010GetsaRedesignedLogo2_thumb.png"><img style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 240px; CURSOR: hand; HEIGHT: 240px" alt="" src="http://www.geeksmack.net/content_media/AnotherOffice2010LeaksBetaExpectedinNove_72/Office2010GetsaRedesignedLogo2_thumb.png" border="0" /></a><br /><br /><br /><br /><div><div><div><div><br /><br /><div><span style="font-size:85%;"></span></div><br /><br /><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><div><span style="font-size:85%;"></span></div><br /><div><span style="font-size:85%;"></span></div><br /><br /><br /><div><span style="font-size:85%;">After Microsoft announced yesterday that Visual Studio 2010 Beta 2 will be sent to testers this week, more exciting news comes from the Office 2010 section. Microsoft has announced that an Office 2010 public beta will be available sometime in November.<br />Office 2010 has be noted as a “hybridization” of applications. It’s available on your PC, in a web browser *Office Web Apps”, and in Windows Mobile as Office Mobile. Currently, only the </span><a href="http://geeksmack.net/microsoft/650-a-glimpse-into-the-microsoft-office-online-apps.html" target="_blank"><span style="font-size:85%;">Office Web Apps</span></a><span style="font-size:85%;"> are available; but to a select group.<br />According to the Wzor website, Office 2010 build 14.0.4514.1009 will be the build Microsoft will officially release as Beta 2 to attendees of the Tech-Ed Conference in Berlin, November 6, 2009.<br />Among things, this build features a new installation procedure, which requires you to enter a unique installation product key. Bad news for pirates.</span></div><br /><br /><br /><div><span style="font-size:85%;"></span></div><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 529px; CURSOR: hand; HEIGHT: 397px; TEXT-ALIGN: center" alt="" src="http://www.geeksmack.net/content_media/AnotherOffice2010LeaksBetaExpectedinNove_72/Office2010Beta21_thumb_thumb.jpg" border="0" /> <img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 531px; CURSOR: hand; HEIGHT: 399px; TEXT-ALIGN: center" alt="" src="http://www.geeksmack.net/content_media/AnotherOffice2010LeaksBetaExpectedinNove_72/Office2010Beta22_thumb.jpg" border="0" /> <img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 531px; CURSOR: hand; HEIGHT: 399px; TEXT-ALIGN: center" alt="" src="http://www.geeksmack.net/content_media/AnotherOffice2010LeaksBetaExpectedinNove_72/Office2010Beta23_thumb.jpg" border="0" /><br /><br /><br /><div></div></div></div></div></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-17620716444384525832009-10-17T15:46:00.000-07:002009-10-17T15:52:38.326-07:00D-Roll<div><br /><br /><div><a href="http://comogy.info/2009/01/D-Roll-001.jpg"><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 500px; CURSOR: hand; HEIGHT: 298px; TEXT-ALIGN: center" alt="" src="http://comogy.info/2009/01/D-Roll-001.jpg" border="0" /></a><br /><br /><br /><div><span style="font-size:85%;">Modern gadgets apart from being stylish are getting smaller day-by-day. And the latest creation to catch our eye is the ‘next gen laptop design’ by Hao Hua. Dubbed “D-roll” or “digital roll,” the new device works like a regular laptop, but rolls up to be a side bag or even a backpack for easy transportation. Designed like an artist’s tube, the D-roll Laptop features a roll up OLED screen and a slide out keyboard, together with a mouse and a detachable webcam that can be worn on your wrist when not attached to the system. The mouse and web camera can also be used as the end caps for the laptop case, while the straps double as ports to plug in your USB devices.</span></div><br /><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 500px; CURSOR: hand; HEIGHT: 445px; TEXT-ALIGN: center" alt="" src="http://comogy.info/2009/01/D-Roll-003.jpg" border="0" /><br /><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 500px; CURSOR: hand; HEIGHT: 298px; TEXT-ALIGN: center" alt="" src="http://comogy.info/2009/01/D-Roll-005.jpg" border="0" /><br /><div><span style="font-size:85%;"></span></div><br /><br /><br /><div></div></div></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com1tag:blogger.com,1999:blog-2308329218437605209.post-39527316253397268472009-10-15T06:26:00.000-07:002009-10-15T06:40:40.358-07:00Delete Files in C:\Windows\Installer<div><span style="font-size:85%;">I was shocked when found out free space in my C drive is only 94MB left. At first I thought it was because of a virus attack so I did run virus scan on my computer but got negative result. So I run disk space analyzer and here is the result.<img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 494px; CURSOR: hand; HEIGHT: 582px; TEXT-ALIGN: center" alt="" src="http://www.cypherhackz.net/wp-content/uploads/2009/04/treesize-installer.jpg" border="0" /><br /></span><br /><div><span style="font-size:85%;">As you can see, 7GB space has been occupied by Installer folder in my C drive. But is it safe to remove all those files from my system?<br />The answer is Yes! But in the future, you might having trouble when want to remove installed programs completely. This is because, C:\Windows\Installer contains a copy of changed system info when you install a program using the Windows installer. With this file, your system can restore back to its original condition when you remove the program using the Add/Remove Programs.<br />But in my situation, I don’t care with the problem or trouble or anything because what I want is the free space in my C drive. So what I did was,</span></div><br /><div><br /><span style="font-size:85%;">1. I downloaded and installed </span><a href="http://support.microsoft.com/kb/290301" oulqg="0" tukve="0"><span style="font-size:85%;">Windows Installer CleanUp Utility</span></a><span style="font-size:85%;">.</span></div><br /><div><br /><span style="font-size:85%;">2. Go to Start > Run and type,<img class="gl_photo" alt="Add Image" src="http://www.blogger.com/img/blank.gif" border="0" /></span></div><br /><div><span style="font-size:85%;"></span></div><br /><div><span style="font-size:85%;"><strong>“C:\Program Files\Windows Installer Clean Up\msizap.exe”</strong> </span></div><br /><div><span style="font-size:85%;"></span></div><br /><div><span style="font-size:85%;">3. Click Ok.<br />Then I wait until Windows Installer CleanUp Utility finished doing its job. And here is the result,</span></div><br /><div><span style="font-size:85%;"></span></div><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 494px; CURSOR: hand; HEIGHT: 582px; TEXT-ALIGN: center" alt="" src="http://www.cypherhackz.net/wp-content/uploads/2009/04/treesize-installer-02.jpg" border="0" /><br /><div><span style="font-size:85%;"></span></div><br /><div><span style="font-size:85%;">I have 4GB of free space available in my C drive. Yay!</span></div><div><span style="font-size:85%;"><br />Warning! The command that I give here might corrupt your system and requires to reinstall or repair.</span></div></div>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0tag:blogger.com,1999:blog-2308329218437605209.post-25558648360067232192009-10-12T21:27:00.000-07:002009-10-12T22:10:20.295-07:00Microsoft’s U.K. Domain was Hacked!<span style="font-size:85%;"><span style="font-size:180%;"><strong>L</strong></span>ooks like the official Microsoft U.K. Domain was attacked and defaced by a hacker identified as rEmOtEr. Microsoft confirmed that the hack has been successful.</span><br /><p><span style="font-size:85%;">rEmOtEr altered a webpage in the Microsoft.co.uk domain with two images and multiple references to the kingdom of Saudi Arabia. The U.K. branch of the Redmond company managed to fix the problem, and the functionality of the website is back to normal parameters. The webpagehacked dealt with Microsoft events and can be found here. In the adjacent image you can see how the hacker defaced the page, courtesy of Zone-H.</span></p><img style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 512px; CURSOR: hand; HEIGHT: 306px; TEXT-ALIGN: center" alt="" src="http://www.zone-h.org/images/june07/microsoft_hacked.jpg" border="0" /><span style="font-size:85%;">Roger Halbheer, chief security advisor for Microsoft in Europe, the Middle East and Africa admitted that the hack was successful and revealed that the whole event was unfortunate. According to Microsoft, no sensitive information was compromised in the attack. This is a clear indication that the hack was done for show, rather than to actually cause any harm. Another argument that supports such a scenario is the fact that rEmOtEr took time to document the hack in two separate video fragments. You will be able to watch for yourselves the live hacking via the two “remoter_vs_microsoft.avi” files.<br />The hack was possible mainly because of the fact that the database was allowed to return error messages explained Halbheer, as cited by InfoWorld. The attack was possible through a technique referred to as SQL injection. This fact is also confirmed by the hacker in the two videos that were made available. Via Structured Query Language injection rEmOtEr was able to gain access to the database. In the video fragments you will be able to see how easy the hacker obtains both usernames and passwords for the database. Working his way from error message to error message, rEmOtEr finally could switch from SQL queries with an unexpected form to direct instructions to the database.<br /></span><p></p>Chaminda Ranasinghehttp://www.blogger.com/profile/09742442240335663842noreply@blogger.com0