Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'security'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 992 results

  1. Zemana Mobile Antivirus Premium v1.6.1 [Unlocked] Overview: Zemana Mobile Antivirus is designed to protect your Android device and tablet from any kind of latest mobile threats such as malware, spyware, virus, keylogger, Trojan and to keep your personal data safe with its famous anti-keylogging feature. Zemana Mobile Antivirus is designed to protect your Android device and tablet from any kind of latest mobile threats such as malware, spyware, virus, keylogger, Trojan and to keep your personal data safe with its famous anti-keylogging feature. Join Zemana Mobile Antivirus community and: ✔ Scan your Android device 5x faster ✔ Protect your device from for malware, spyware, virus, and phishing attacks ✔ Preserve your private data, with our anti-keylogging feature*, by catching malicious keyboard applications, password managers and SMS applications(NEW) ✔ Stay safe from latest threats with our always-up-to-date virus database Zemana Mobile Antivirus has been tested and certified by #1 Antivirus testing house AVTEST. With Zemana Mobile Antivirus your Android device and tablet will get the most efficient antivirus and privacy protection. It is a lightweight security app that has no impact on your battery life and it’s easy to use. ANDROID ANTIVIRUS SECURITY – PREMIUM FEATURES (Try 15 days FREE) ★ Real time protection Automatically scans newly installed applications. There is no need to initiate manual scan in order to stay safe. Your Android device is protected 24/7 from virus, malware, spyware, keylogger and any other security threat. ★ Automatic DB updates Keeps your Android device stay in sync with the up-to-date threat database so you stay protected from the latest security threats. ★ Anti–Keylogger protection* Detects and blocks malicious keyboard applications, password managers and malicious SMS applications(NEW) that are able to track everything you type. ★ 24/7 Technical Support Stay worry-free. If a threat emerges that doesn’t want to go away, our engineers will connect to your Android device and clean up the infection manually. Install Zemana Mobile Antivirus FREE and scan your Android device with the fastest and most effective antivirus scan and your Android device and tablet will always be malware free. ► Upgrade now to Premium version of Zemana Mobile Antivirus and protect multiple devices in your household with advanced and proactive antivirus solution. Zemana Mobile Antivirus is available in 16 languages: English, Turkish, Spanish, Russian, Italian, Indonesian, Polish, Vietnamese, Bengali, Dutch, German, Portuguese, Bosnian, Croatian, Korean, Hungarian * Some legitimate keyboard applications are modified by hackers which gives them access to track everything you type; due to the anti-keylogger they will be detected and blocked by Zemana Mobile Antivirus as malicious. For the latest antivirus and security updates see: http://blog.zemana.com Requirements: 2.3+ What's New Fixed a bug in premium system Internal Improvements for better usage statistics Minor improvements and bug fixes This app has NO advertisements Download Instructions: Lifetime Subscription Unlocked Downloads - [APK - RAR]: Downloads - [APK]:
  2. Seed4.Me VPN - 6 Months[180 Days] Promo by SharewareOnSale Overview: Surf the web anonymously, mask your location, making the geo-IP address different from the real one, so no one can trace you. Seed4.Me VPN for Windows, Mac OS, Android, iPhone and iPad also unblocks sites that are normally restricted in the area of your current location. All Features: Really simple setup 17 countries to choose from Unlimited traffic Connecting directly from the application Single account is valid for all your Android, iOS devices and computer Multiple languages support: English, Arabic, Chinese, Spanish, Russian and Portuguese Automatic and manual connection switch in iOS iOS 10, Android 4, 5, 6 and 7 compatible Windows XP 64-bit, 7, 8, 8.1, 10 compatible Mac OS compatible More Info: Product Homepage, About, Support, Setup Guides, Blog. TorrentFreak 2017 Anonymity Review: https://torrentfreak.com/vpn-services-anonymous-review-2017-170304/#seed4me Links: Offer: https://sharewareonsale.com/s/free-seed4-me-vpn-100-discount Note: Limited Period Offer. Expires by 23 March 2017. Current Status: Open. If you are getting 64bit only installer, please contact sos discussion page. Downloads: Windows - Size: 11.5 MB: https://www.seed4.me/files/seed4me-vpn-1.0.5.exe
  3. Mozilla Fixes Critical Vulnerability in Firefox 22 Hours After Discovery White hats were rewarded $30,000 for the effort The new Firefox version 52.0.1 which was released late on Friday contains the patch for the flaw discovered by hackers in the competition. The fix was confirmed via Twitter by Asa Dotzler, Mozilla participation director for Firefox OS, as well as Daniel Veditz, security team member at Mozilla. The bug was discovered by the Chaitin Security Research Lab from China. The hackers managed to escalate privileges in an exploit during the hacking competition by combining the bug with an initialized buffer in the Windows kernel. The bug bounty for this particular vulnerability was of $30,000 indicating that it was a serious matter. In a security advisory published by Mozilla, the company marks the integer overflow in the createImageBitmap() as "critical." They say that the bug was fixed in the newest version by disabling experimental extensions to the createImageBitmap API. Mozilla also claims that since the function works int he content sandbox, it would have required a second vulnerability to compromise a user's computer. Chaitin used, in this instance, the Windows kernel. Largest awards so far Many vulnerabilities were discovered during the hacking competition. So far, few have been fixed, and definitely not many as fast as the one Mozilla patched up in Firefox. Microsoft and Apple are two of the companies people are waiting to hear from int his regard In total, contestants were awarded $833,000 for the discovered vulnerabilities this year, nearly double than what was awarded last year. In 2016, the awards reached $460,000 and the previous year $577,000. In the end, it all depends on how good a day the hackers have to find something critical to exploit. Source
  4. Online security needs to taken seriously to prevent attacks Sure, you may not be a celebrity, but who's to say your account may not become interesting to a hacker? Who's to say said hacker won't keep your content captive in turn for a ransom? The Fappening is happening again, as you may have heard already. Just like in 2014, hackers are dumping photos and videos of female celebrities on platforms such as 4chan and reddit, exposing intimate footage that was never meant to see the light of day. The morality of such a move can only be expressed through one word - "lacking." It does not matter who you are, you have the right to privacy, just as these actresses and models did. Just because they are public persons does not mean that every little thing they do is public too. Victim blaming, like in many other instances, is not the way to go; because that's what these women are: victims of what one reader perfectly described as "digital sexual assault." We're not even going to bring into discussion those who think these women took personal, private, pictures just so they could get hacked and exposed. Then and now In 2014, hackers managed to get into celebrities' accounts by hacking into their iCloud and Gmail accounts via a simple phishing scam. This time around, it's unclear how they managed to do this, but there are so many ways this could have been achieved. An obvious one is a phishing attack - one inconspicuous email sent to these women, have them click a link, get them to sign in their data, and you're in. Then, there have been so many data breaches in recent months and years that it's quite possible their information was already out there. Reusing your password is a surefire way to get hacked if someone really wants a way into your account. Even tweaking it just a bit will not keep a hacker away for long. There's also Twitter, a place where every celebrity has an account. As one hacker pointed out after President Trump entered the White House, it's quite easy to guess what email address one is using by trying to reset their password, unless proper steps are taken to secure the account, namely to have them ask you for personal information (your phone number) when resetting your password). Upgrade your security So what are a few steps to avoid getting hacked like these ladies have? 1. never use the same password twice and use complicated passwords that are (preferably) at least 10 characters long. 2. secure your email and cloud accounts with two-step authentication 3. don't download suspicious files on your computer or phone 4. don't tap on links sent to you via email from people you don't know 5. don't install apps that have not been verified - they might carry malware 6. secure your social media accounts with two-step authentication and any other steps they offer to keep your details private 7. take the time every so often to update your passwords and security questions Online security is extremely important nowadays and it will only continue to grow in importance. It is hacks like these, affecting people's privacy, that stress just how crucial it is to safeguard all your data. Source
  5. FBI Director James Comey (left) testifies in front of the House Intelligence Committee on Monday regarding Russian hacking during the 2016 election. The agency's director, James Comey, confirms the FBI is looking into any possible ties between the president's campaign and the Russian government. In a rare move, the FBI confirmed that it is investigating whether Russian hackers had any links to President Trump's election team. Citing "unusual circumstances," FBI Director James Comey said that the bureau is looking into whether Trump's campaign worked with Russian officials during the 2016 election. "I have been authorized by the Department of Justice to confirm that the FBI, as part of our counterintelligence mission, is investigating the Russian government's efforts to interfere in the 2016 presidential election," Comey testified at a House committee hearing on Monday. "That includes investigating the nature of any links between individuals associated with the Trump campaign and the Russian government, and whether there was any coordination with the campaign and Russia's efforts." These are unusual circumstances indeed. Worries about Russian hacks plagued the US presidential election and its aftermath, with US intelligence agencies accusing Russia of meddling in the race for the White House. The House Intelligence Committee is investigating how the cyberattacks happened and how to protect the nation's democratic processes from interference in the future. The breaches included hacking emails from the Democratic National Committee, Democratic candidate Hillary Clinton and her campaign manager, John Podesta. Comey had earlier testified before the House Intelligence committee concerning Russian hacks during the election, revealing there were no attacks against the Trump campaign or the Republican National Committee. During the campaign, Donald Trump publicly urged Russia to help turn up Clinton's emails. Members of the Trump administration, including attorney general Jeff Sessions, former national security adviser Michael Flynn and Secretary of State Rex Tillerson, have also faced controversy for ties to Russian officials. The Obama administration in late December retaliated against Russia, imposing sanctions over the cyberattacks even as Russian officials continue to deny any involvement in the hacks. Russia's relationships with the US has been on shaky ground since. Comey revealed that the FBI has been investigating Russian influence on the 2016 election since last July, when hackers apparently first infiltrated the DNC. It remains unclear when the investigation will end. During the hearing, Comey also rebutted President Trump's tweets that the Obama administration ordered a wiretap on Trump Tower during the campaign. That echoed House Intelligence committee chairman Devin Nunes and the Justice Department's findings. "I have no information that supports those tweets, and we have looked carefully inside the FBI," Comey said. The National Security Agency director Michael Rogers also denied Trump's claims during the hearing. Source
  6. NEW DELHI: A burger can cost you a lot. Personal data of more than 2.2 million users has leaked from McDonald's India app, McDelivery, cyber security firm Fallible said. The leaked data includes name, phone number, email addresses, home addresses, accurate home-coordinates and social profile links. Cyber security experts said hackers could use the information to access financial details of users, including credit/debit card information and e-wallet details. The compromised app and website of the US burger chain is operated by Westlife Development, which runs McDonald's operations in the south and west India. The official spokesperson of McDonald's India (west & south) said, "We would like to inform our users that our website and app does not store any sensitive financial data of users like credit card details, wallets passwords or bank account information. The website and app has always been safe to use, and we update security measure on regular basis. As a precautionary measure, we would also urge our users to update the McDelivery app on their devices. At McDonald's India, we are committed to our users' data privacy and protection." Amit Singh, co-founder of Yitsol, which provides cloud migration services, said, "Security is the last priority of many firms in India. I know of incidents in Hyderabad, where hackers stole user information from startups and demanded ransom in Bitcoins." With the country going digital and app usage on the rise companies could not afford to relax when it comes to cyber security, he said. Fallible said it contacted McDelivery about the data leak on February 7 and received an acknowledgement from a senior IT manager at the firm. "The McDonald's fix is incomplete and the endpoint is still leaking data," Fallible wrote on its blog on Saturday. Article source
  7. Bitdefender 2017 - Stable - Final - Offline Standalone Installers For Windows[x86 & x64] Bitdefender 2017 AV Plus / Internet Security / Total Security - Standalone Installers [Windows]: 32bit [x86] - [Size: 373.53 MB]: https://download.bitdefender.com/windows/desktop/connect/cl/2017/all/bitdefender_ts_21_32b.exe 64bit [x64] - [Size: 413.18 MB]: https://download.bitdefender.com/windows/desktop/connect/cl/2017/all/bitdefender_ts_21_64b.exe Bitdefender Agent - 2017 - Universal [Same Agent for AV Plus / IS / TS]: Screenshots: Install Notes: Precaution Note: If you've already installed older version of Bitdefender[incl. 2016 version], we are sure that you'll lose your settings. Please take note of configuration, settings. whitelisted files and links Download and Install Bitdefender Agent. When it starts downloading the install files, Stop/Close it immediately. Note: Check whether there the Agent is installed only once in "Add/Remove Programs" or "Programs & Features". Note: Check in "Program Files" for folder named "Bitdefender Agent". Now, start installing offline installer and proceed with installation. Note: Please choose respective download link based on architecture x86/x64 for smooth installation. Note: Don't worry about AV Plus/IS/TS. The installer automatically modifies the installation depending on the license you entered. Once installation is done, configure accordingly for best protection and to avoid files from getting deleted. Configure Whitelist files and links if you have any. It is better to keep note of the configured settings for future use. User Guide: Bitdefender Antivirus Plus 2017: https://download.bitdefender.com/resources/media/materials/2017/userguides/en_EN/bitdefender_av_2017_userguide_en.pdf Bitdefender Internet Security 2017: https://download.bitdefender.com/resources/media/materials/2017/userguides/en_EN/bitdefender_is_2017_userguide_en.pdf Bitdefender Total Security 2017: https://download.bitdefender.com/resources/media/materials/2017/userguides/en_EN/bitdefender_ts_2017_userguide_en.pdf Uninstall Tool: Uninstall Tool For Bitdefender 2017 Products: http://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2017_UninstallTool.exe NOTE: Bitdefender 2017 Uninstall Tool require KB2999226. If you didn't install, you'll get error "api-ms-win-crt-runtime-l1-1-0.dll" missing. You can download it here - KB2999226 Uninstall Tool For Bitdefender 2016 Products: http://www.bitdefender.com/files/KnowledgeBase/file/Bitdefender_2016_UninstallTool.exe Uninstall Tool For Bitdefender 2015 / 2014 / 2013 Products: http://www.bitdefender.com/files/KnowledgeBase/file/The_New_Bitdefender_UninstallTool.exe Uninstall Tool For Bitdefender 2012 Products and Earlier: http://www.bitdefender.com/files/KnowledgeBase/file/BitDefender_Uninstall_Tool.exe
  8. Systems Affected All systems behind a hypertext transfer protocol secure (HTTPS) interception product are potentially affected. Overview Many organizations use HTTPS interception products for several purposes, including detecting malware that uses HTTPS connections to malicious servers. The CERT Coordination Center (CERT/CC) explored the tradeoffs of using HTTPS interception in a blog post called The Risks of SSL Inspection. Organizations that have performed a risk assessment and determined that HTTPS inspection is a requirement should ensure their HTTPS inspection products are performing correct transport layer security (TLS) certificate validation. Products that do not properly ensure secure TLS communications and do not convey error messages to the user may further weaken the end-to-end protections that HTTPS aims to provide. Description TLS and its predecessor, Secure Sockets Layer (SSL), are important Internet protocols that encrypt communications over the Internet between the client and server. These protocols (and protocols that make use of TLS and SSL, such as HTTPS) use certificates to establish an identity chain showing that the connection is with a legitimate server verified by a trusted third-party certificate authority. HTTPS inspection works by intercepting the HTTPS network traffic and performing a man-in-the-middle (MiTM) attack on the connection. In MiTM attacks, sensitive client data can be transmitted to a malicious party spoofing the intended server. In order to perform HTTPS inspection without presenting client warnings, administrators must install trusted certificates on client devices. Browsers and other client applications use this certificate to validate encrypted connections created by the HTTPS inspection product. In addition to the problem of not being able to verify a web server’s certificate, the protocols and ciphers that an HTTPS inspection product negotiates with web servers may also be invisible to a client. The problem with this architecture is that the client systems have no way of independently validating the HTTPS connection. The client can only verify the connection between itself and the HTTPS interception product. Clients must rely on the HTTPS validation performed by the HTTPS interception product. A recent report, The Security Impact of HTTPS Interception, highlighted several security concerns with HTTPS inspection products and outlined survey results of these issues. Many HTTPS inspection products do not properly verify the certificate chain of the server before re-encrypting and forwarding client data, allowing the possibility of a MiTM attack. Furthermore, certificate-chain verification errors are infrequently forwarded to the client, leading a client to believe that operations were performed as intended with the correct server. This report provided a method to allow servers to detect clients that are having their traffic manipulated by HTTPS inspection products. The website badssl.com is a resource where clients can verify whether their HTTPS inspection products are properly verifying certificate chains. Clients can also use this site to verify whether their HTTPS inspection products are enabling connections to websites that a browser or other client would otherwise reject. For example, an HTTPS inspection product may allow deprecated protocol versions or weak ciphers to be used between itself and a web server. Because client systems may connect to the HTTPS inspection product using strong cryptography, the user will be unaware of any weakness on the other side of the HTTPS inspection. Impact Because the HTTPS inspection product manages the protocols, ciphers, and certificate chain, the product must perform the necessary HTTPS validations. Failure to perform proper validation or adequately convey the validation status increases the probability that the client will fall victim to MiTM attacks by malicious third parties. Solution Organizations using an HTTPS inspection product should verify that their product properly validates certificate chains and passes any warnings or errors to the client. A partial list of products that may be affected is available at The Risks of SSL Inspection. Organizations may use badssl.com as a method of determining if their preferred HTTPS inspection product properly validates certificates and prevents connections to sites using weak cryptography. At a minimum, if any of the tests in the Certificate section of badssl.com prevent a client with direct Internet access from connecting, those same clients should also refuse the connection when connected to the Internet by way of an HTTPS inspection product. In general, organizations considering the use of HTTPS inspection should carefully consider the pros and cons of such products before implementing. Organizations should also take other steps to secure end-to-end communications, as presented in US-CERT Alert TA15-120A. Article source
  9. Five Issues That Will Determine The Future Of Internet Health In January, we published our first Internet Health Report on the current state and future of the Internet. In the report, we broke down the concept of Internet health into five issues. Today, we are publishing issue briefs about each of them: online privacy and security, decentralization, openness, web literacy and digital inclusion. These issues are the building blocks to a healthy and vibrant Internet. We hope they will be a guide and resource to you. We live in a complex, fast moving, political environment. As policies and laws around the world change, we all need to help protect our shared global resource, the Internet. Internet health shouldn’t be a partisan issue, but rather, a cause we can all get behind. And our choices and actions will affect the future health of the Internet, for better or for worse. We work on many other policies and projects to advance our mission, but we believe that these issue briefs help explain our views and actions in the context of Internet health: 1. Online Privacy & Security: Security and privacy on the Internet are fundamental and must not be treated as optional. In our brief, we highlight the following subtopics: Meaningful user control – People care about privacy. But effective understanding and control are often difficult, or even impossible, in practice. Data collection and use – The tech industry, too often, reflects a culture of ‘collect and hoard all the data’. To preserve trust online, we need to see a change. Government surveillance – Public distrust of government is high because of broad surveillance practices. We need more transparency, accountability and oversight. Cybersecurity – Cybersecurity is user security. It’s about our Internet, our data, and our lives online. Making it a reality requires a shared sense of responsibility. Protecting your privacy and security doesn’t mean you have something to hide. It means you have the ability to choose who knows where you go and what you do. 2. Openness: A healthy Internet is open, so that together, we can innovate. To make that a reality, we focus on these three areas: Open source – Being open can be hard. It exposes every wrinkle and detail to public scrutiny. But it also offers tremendous advantages. Copyright – Offline copyright law built for an analog world doesn’t fit the current digital and mobile reality. Patents – In technology, overbroad and vague patents create fear, uncertainty and doubt for innovators. Copyright and patent laws should better foster collaboration and economic opportunity. Open source, open standards, and pro-innovation policies must continue to be at the heart of the Internet. 3. Decentralization: There shouldn’t be online monopolies or oligopolies; a decentralized Internet is a healthy Internet. To accomplish that goal, we are focusing on the following policy areas. Net neutrality – Network operators must not be allowed to block or skew connectivity or the choices of Internet users. Interoperability – If short-term economic gains limit long-term industry innovation, then the entire technology industry and economy will suffer the consequences. Competition and choice – We need the Internet to be an engine for competition and user choice, not an enabler of gatekeepers. Local contribution – Local relevance is about more than just language; it’s also tailored to the cultural context and the local community. When there are just a few organizations and governments who control the majority of online content, the vital flow of ideas and knowledge is blocked. We will continue to look for public policy levers to advance our vision of a decentralized Internet. 4. Digital Inclusion: People, regardless of race, income, nationality, or gender, should have unfettered access to the Internet. To help promote an open and inclusive Internet, we are focusing on these issues: Advancing universal access to the whole Internet – Everyone should have access to the full diversity of the open Internet. Advancing diversity online – Access to and use of the Internet are far from evenly distributed. This represents a connectivity problem and a diversity problem. Advancing respect online – We must focus on changing and building systems that rely on both technology and humans, to increase and protect diverse voices on the Internet. Numerous and diverse obstacles stand in the way of digital inclusion, and they won’t be overcome by default. Our aim is to collaborate with, create space for, and elevate everyone’s contributions. 5. Web Literacy: Everyone should have the skills to read, write and participate in the digital world. To help people around the globe participate in the digital world, we are focusing on these areas: Moving beyond coding – Universal web literacy doesn’t mean everyone needs to learn to code; other kinds of technical awareness and empowerment can be very meaningful. Integrating web literacy into education – Incorporating web literacy into education requires examining the opportunities and challenges faced by both educators and youth. Cultivating digital citizenship – Everyday Internet users should be able to shape their own Internet experience, through the choices that they make online and through the policies and organizations they choose to support. Web literacy should be foundational in education, like reading and math. Empowering people to shape the web enables people to shape society itself. We want people to go beyond consuming and contribute to the future of the Internet. Promoting, protecting, and preserving a healthy Internet is challenging, and takes a broad movement working on many different fronts. We hope that you will read these and take action alongside us, because in doing so you will be protecting the integrity of the Internet. For our part, we commit to advancing our mission and continuing our fight for a vibrant and healthy Internet. Source
  10. Telegram v3.18.0 Beta Overview: Pure instant messaging — simple, fast, secure, and synced across all your devices. Over 100 million active users in two and a half years. FAST: Telegram is the fastest messaging app on the market, connecting people via a unique, distributed network of data centers around the globe. SYNCED: You can access your messages from all your devices at once. Start typing on your phone and finish the message from your tablet or laptop. Never lose your data again. UNLIMITED: You can send media and files, without any limits on their type and size. Your entire chat history will require no disk space on your device, and will be securely stored in the Telegram cloud for as long as you need it. SECURE: We made it our mission to provide the best security combined with ease of use. Everything on Telegram, including chats, groups, media, etc. is encrypted using a combination of 256-bit symmetric AES encryption, 2048-bit RSA encryption, and Diffie–Hellman secure key exchange. POWERFUL: You can create group chats for up to 5,000 members, share large videos, documents of any type (.DOC, .MP3, .ZIP, etc.), and even set up bots for specific tasks. It's the perfect tool for hosting online communities and coordinating teamwork. RELIABLE: Built to deliver your messages in the minimum bytes possible, Telegram is the most reliable messaging system ever made. It works even on the weakest mobile connections. FUN: Telegram has powerful photo and video editing tools and an open sticker/GIF platform to cater to all your expressive needs. SIMPLE: While providing an unprecedented array of features, we are taking great care to keep the interface clean. With its minimalist design, Telegram is lean and easy to use. 100% FREE & NO ADS: Telegram is free and will always be free. We are not going to sell ads or introduce subscription fees. PRIVATE: We take your privacy seriously and will never give third parties access to your data. For those interested in maximum privacy, Telegram offers Secret Chats. Secret Chat messages can be programmed to self-destruct automatically from both participating devices. This way you can send all types of disappearing content — messages, photos, videos, and even files. Secret Chats use end-to-end encryption to ensure that a message can only be read by its intended recipient. We keep expanding the boundaries of what you can do with a messaging app. Don’t wait years for older messengers to catch up with Telegram — join the revolution today. Requirements: 4.0+ What's New: Mar 15 | v3.18 New! Added the possibility of routine Voice Calls through connected Bluetooth devices New! Email hint and verification for Payment methods and invoice creation New! Customized ringtone per user New! Busy and network issues recognition for VoIP New! Slow connection enhancements New! Additional: I am not fully sure. But Telegram might be giving an option to record calls also. This app has NO advertisements Downloads: Note: To make use of the voice calls feature, both the end-users should have this specific version. Mirror:
  11. Proton VPN 0.9.4 Beta Overview: ProtonVPN is designed from the ground up with a special emphasis on security and privacy, and features a number of innovations that we have made to harden VPN against compromises. ProtonVPN will eventually feature free and premium versions containing different features. For the beta period, you will be able to test the full-fledged premium version of ProtonVPN for free. Layers of Protection: Limitation / blocking access to the data / application Isolation and create a separate database / application Backup / important data Detecting and deleting viruses / malware. Proton Mail announced beta VPN service for PLUS proton mail users. At this moment, Proton VPN offers 13 countries with 4/IP Australia Canada France Germany Hong Kong Iceland Japan Netherlands Spain Sweden Switzerland United Kingdom United States More Info: Official Product Homepage / Detailed Features: https://protonvpn.com/home Official Website: https://protonvpn.com/ Blog: https://protonvpn.com/blog/ ProtonVPN is still a work in progress, and we will be releasing more details over the next couple months about what makes ProtonVPN different. You can follow ProtonVPN on social media to get the latest news and updates: Facebook: https://facebook.com/ProtonVPN Twitter: https://twitter.com/ProtonVPN We would love to hear your feedback on the beta and what we can do to improve ProtonVPN. In addition to the links above, you can also send your suggestions to [email protected] If you run into trouble with ProtonVPN, or have questions, you can search for answers or contact us via the ProtonVPN support site: https://protonvpn.com/support/ Screenshots: Downloads: Stability Advisory: This is a "beta" software release which contains known bugs. The ProtonVPN client for Windows can be downloaded here: Windows: https://protonvpn.com/download/ Clients for macOS, Linux, Android, and iOS are still under development, but it is still possible to use ProtonVPN with these operating systems using third-party OpenVPN clients. Setup guides can be found here: MacOS: https://protonvpn.com/support/mac-vpn-setup/ Linux: https://protonvpn.com/support/linux-vpn-setup/ Download(Win): https://protonvpn.com/download/ProtonVPN_win_v0.9.4.exe
  12. Canonical announces Ubuntu Linux 12.04 ESM (Extended Security Maintenance) On April 25th, Ubuntu Linux 12.04 LTS will no longer be supported by Canonical. Why? That is the 5 year anniversary of the release, which is the amount of support time given to an LTS (Long Term Support) version of the Linux distribution. For many home users, this really doesn't matter, as they have probably already upgraded to a newer version. Unfortunately, some businesses do not upgrade as regularly. In fact, some organizations may not be ready to move on from Ubuntu 12.04. Tough luck? Not at all. Today, Canonical introduces Ubuntu Linux 12.04 ESM. This "Extended Security Maintenance" release is not free, however -- organizations must pay for the extended support. "Following the end-of-life of Ubuntu 12.04 LTS, Canonical is offering Ubuntu 12.04 ESM (Extended Security Maintenance), which provides important security fixes for the kernel and the most essential user space packages in Ubuntu 12.04. These updates are delivered in a secure, private archive exclusively available to Ubuntu Advantage customers," says Canonical. The company further says, "All Ubuntu 12.04 LTS users are encouraged to upgrade to Ubuntu 14.04 LTS or Ubuntu 16.04 LTS. But for those who cannot upgrade immediately, Ubuntu 12.04 ESM updates will help ensure the on-going security and integrity of Ubuntu 12.04 systems". If you are interested in leveraging this ESM version of the Linux Distribution, you must become a paid Ubuntu Advantage member. To check out pricing, just head over to the website here. While using this ESM version is certainly a smart move, businesses should also consider upgrading to a newer version of the operating system -- after extensive testing, of course. Source
  13. Facebook Bans Devs From Creating Surveillance Tools With User Data Without a hint of irony, Facebook has told developers that they may not use data from Instagram and Facebook in surveillance tools. The social network says that the practice has long been a contravention of its policies, but it is now tidying up and clarifying the wording of its developer policies. American Civil Liberties Union, Color of Change and the Center for Media Justice put pressure on Facebook after it transpired that data from users' feeds was being gathered and sold on to law enforcement agencies. The re-written developer policy now explicitly states that developers are not allowed to "use data obtained from us to provide tools that are used for surveillance." It remains to be seen just how much of a difference this will make to the gathering and use of data, and there is nothing to say that Facebook's own developers will not continue to engage in the same practices. Deputy chief privacy officer at Facebook, Rob Sherman, says: Transparency reports published by Facebook show that the company has complied with government requests for data. The secrecy such requests and dealings are shrouded in means that there is no way of knowing whether Facebook is engaged in precisely the sort of activity it is banning others from performing. Source
  14. Bitdefender 2017 Build Overview: The Bitdefender proprietary technologies, based on innovative ideas and leading trends in the information security industry, continue to be internationally recognized as the best Internet security software. The independent organizations which reward BitDefender outstanding results through numerous prizes and certifications are: Av-Test.org, Virus Bulletin, ICSA Lab, Checkmark, PC World Top 100, just to name but a few. Homepage: https://www.bitdefender.com/ Changelog: Yet to be Updated KB is unavailable at this time. Downloads: Online Installers: Bitdefender Antivirus Plus 2017 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_antivirus.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_antivirus.exe Bitdefender Internet Security 2017 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_isecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_isecurity.exe Bitdefender Total Security 2017 Online: https://download.bitdefender.com/windows/installer/en-us/bitdefender_tsecurity.exe XP | Vista: https://download.bitdefender.com/windows/installer/en-us/xp-vista/bitdefender_tsecurity.exe Offline Installers and Install Guide: Checksum - 10 Mar 2017 Offline Installer Update: bitdefender_ts_21_32b.exe (application/octet-stream) - 391676120 bytes MD5: a66d418e7b88e99e16a6e0e4d6b39344 SHA-1: 7c0fc6a890d533a2ca1280afe748458d5fc409f1 SHA-256: 2b7b052f3f94f6172176d53c2d1ec58ab5f82d0170bbb722ff407f34860d8c3a SHA-384: 79cc8deb7b4756bfe37e692bcc44a3721a0391dac0e51146ff201c6bfa1b23ed649d5a6fd7849b65a9f2c04b4ec2b517 SHA-512: 06acde22d638d1effeda481c4808839fcc629bef6db71ee6f9ae2da1370e89fc895e1b31f7251f07b3e09ee1e4ae320494fff82d3b221baaea1fd95664aa59a1 bitdefender_ts_21_64b.exe (application/octet-stream) - 433246512 bytes MD5: 9591493ba9892384737795c8740ef668 SHA-1: 2339248747187c83401865dfd4a8f70783044b23 SHA-256: e3fead4b4b98819ed1ad71de046b6bd91ca3677c2fc5229bf00911727cd20b3e SHA-384: f0cf9c8ea055f1402225be630b25fdf113a1ec556eb102999be0d46d2339cac7fb0fc15780efb2364258e14664a01066 SHA-512: 346e3b2b8d213df5cfd822dae2fc564bf8f40b6d2ac5f72fd9a43efcd7f97da93f65bbebafad55c559d4d6bdd88e012d466317842739e90006cff6a85008cecd Bitdefender 2017 Offline Installation Guide:
  15. This Device Works as a Firewall for Your USB Ports USG v1.0 (via Robert Fisk) The USG is an USB attachment that allows users to connect USB flash drives and other USB devices to their computer without any of the risks. Attacks like BadUSB have shown how a rogue device can mimic a benign USB interface, but secretly send malicious low-level commands and take over a computer via its USB port. USG works like a firewall for USB connections USG, created by New Zealander Robert Fisk, works as an intermediary between the computer and the USB device (flash drive, USB keyboard, USB mouse) and behaves similar to a firewall, inspecting the data that passes through it. USG, which runs on custom firmware, only lets data pass, ignoring any kind of low-level interactions between the USB device and computer. Furthermore, USG protection goes both ways, meaning you can use USG to protect USB flash drives when connecting to unknown computers. USG designed to thwart BadUSB attacks BadUSB attacks work because computers inherently trust anything connected via an USB port. If it's a mouse or a device such as PoisonTap, which can alter DNS settings and dump passwords, the computer behaves the same. It doesn't care. Fisk says he developed USG after realizing he also couldn't trust the vendors of USB-based components. "Do you know who developed your flash drive's firmware" Fisk asks, "It's probably not the company name printed on the packaging." "Has the firmware been audited for backdoors and malicious functionality? Can you confirm that the firmware running on your drive hasn't been maliciously modified during or after manufacture?" These questions drove him to create USG using off-the-shelf development boards. He then wrote custom firmware to power these boards and make USG work as USB devices should, only focusing on the data transfer, and nothing else. Fisk open-sourced USG's firmware on GitHub. USG drawbacks Of course, this has its drawbacks. A lot of the noise traffic on USB devices is the firmware negotiating connections and improving data transfer speeds. These things are not included in USG, as they are the attack vectors for BadUSB. As such, the recently released USG v1.0 only supports a data transfer speed of up to 1 MB/s, much inferior to commercial USB devices that work in the range of tens of MB/s. In addition, USG only supports USB mass storage (flash drives), keyboards, and mice, but Fisk promises to add support for other types of USB devices in the future. People can buy or make their own USG Fisk says that anyone can make their own USG devices using off-the-shelf development boards, but if they don't have the skills, he's also selling USG devices for around $60 + shipping. "My reputation hinges on the integrity of this project," Fisk explains. "This includes the integrity of the hardware I am offering for sale. This is why I will never outsource the manufacture of USG hardware to another country." "The USG is assembled in New Zealand under my direct supervision, and the firmware is programmed from a secure device by yours truly," the developer adds. "USG devices delivered by post have tamper-evident seals placed around the case, so any attempt to reprogram the firmware is visible." Fisk recommends USG for companies and people who want to protect crucial workstations, or for people who travel a lot and have an USB flash drive they often connect to many untrusted computers. The only downside to USG (by design) is that it doesn't distinguish between good data and bad data. Malware stored on an USB flash drive can pass through USG without any warnings since the malware is just a random blob of data to USG. For malware attacks, you'll have to rely on an antivirus. Source
  16. Mozilla: People Have No Idea How To Protect Their Privacy And Security Online Privacy and security are major concerns when it comes to life online, but a survey by Mozilla reveals that a worrying number of people do not know how to stay in control of them. The company also found that a third of people feel they have no control over their information online, with a similar number confessing to knowing "very little" about encryption. But these are not the only concerns of internet users. Mozilla also asked about people's greatest online fears. Topping the list is "being hacked by a stranger" (a fear held by 80 percent of people), and "being tracked by advertisers" (61 percent). As well as presenting the results of its survey, Mozilla also has some important advice. The survey results reveal the thoughts of 30,000 internet users. Mozilla notes: "We recycle passwords, we run outdated software and we volunteer personal information for a free coupon. If this same carelessness carried over to the physical world, our wallets might be a lot lighter. And our neighbors might know a lot more about us than we want. Why is that? And what can we do to fix it?" To answer "why?", the answer seems to be ignorance -- perhaps with a dash of laziness when it comes to self-education. 90 percent of people said they don’t know much about how to protect themselves online -- Mozilla says that a good starting point is to ensure that all software is kept fully up to date. Privacy is also a major concern with people feeling a general lack of control over their personal information -- Mozilla suggests using private browsing modes. While a third of people admitted to knowing nothing, or next to nothing about encryption, Germans are usually clued up: 85 percent of German respondents have some knowledge of encryption. Despite a generally poor knowledge of security, most people (two thirds) said they would not be willing to attend a training session to learn about secure tools. We've already mentioned some of the fears people have, and other interesting findings include the revelation that 40 percent of people are concerned about being harassed online. 7 percent fear friends or family accessing private accounts. It seems that the internet -- as well as how it has developed, and how data is used -- has turned us into a paranoid bunch. Asked who they would trust for information about online privacy, 56 percent would turn to non-profits, 13 percent would trust the government, and a mere 5 percent would put their faith in social media. Check out the full results of the survey in Mozilla's post on Medium. Source
  17. NOD32 Antivirus & ESET Smart Security v8.0.319.0 English Silent Note: Update: - Excluded a new site that TNod use Credits to Cerberus (Scripting Help) ESET NOD32 Antivirus: 32Bit (Size: 70.6 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/1RCBMOLD/ESET_NOD32_Antivirus_v8.0.319.0_32Bit.zip_links 64Bit (Size: 79.9 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/07MFNOKR/ESET_NOD32_Antivirus_v8.0.319.0_64Bit.zip_links ESET Smart Security 32Bit (Size: 77.7 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/OLZAEFQI/ESET_Smart_Security_v8.0.319.0_32Bit.zip_links 64Bit (Size: 88 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/17IRIU9W/ESET_Smart_Security_v8.0.319.0_64Bit.zip_links ESET NOD32 Antivirus & ESET Smart Security v9.0.386.0 English Silent Note: Update: - Updated to v9.0.386.0 - Added a new key ESET NOD32 Antivirus: 32Bit (Size: 88.5 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/0PIHCVWO/ESET_NOD32_Antivirus_v9.0.386.0_32Bit_Silent.zip_links 64Bit (Size: 92.4 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/AFKOXL3O/ESET_NOD32_Antivirus_v9.0.386.0_64Bit_Silent.zip_links ESET Smart Security 32Bit (Size: 98.3 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/0QJWT5U1/ESET_Smart_Security_v9.0.386.0_32Bit_Silent.zip_links 64Bit (Size: 102 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/1PHMCQKT/ESET_Smart_Security_v9.0.386.0_64Bit_Silent.zip_links ESET NOD32 Antivirus & ESET Internet Security & ESET Smart Security v10.0.390.0 English Silent Note: A Video To See How Silent Work ESET NOD32 Antivirus: 32Bit (Size: 91 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/B5CEPJLE/ESET_NOD32_Antivirus_v10.0.390.0_32Bit_Silent.zip_links 64Bit (Size: 95.5 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/ELMJLG5D/ESET_NOD32_Antivirus_v10.0.390.0_64Bit_Silent.zip_links ESET Internet Security 32Bit (Size: 97.9 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/1OPFSSTM/ESET_Internet_Security_v10.0.390.0_32Bit_Silent.zip_links 64Bit (Size: 103 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/Z9GBWYC1/ESET_Internet_Security_v10.0.390.0_64Bit_Silent.zip_links ESET Smart Security 32Bit (Size: 98.3 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/0EVEXTZJ/ESET_Smart_Security_v10.0.390.0_32Bit_Silent.zip_links 64Bit (Size: 103 MB) Site: http://www.mirrorcreator.com Sharecode[?]: /files/8BKTB8LU/ESET_Smart_Security_v10.0.390.0_64Bit_Silent.zip_links Additional info for v9 & v10:
  18. Google Turns reCAPTCHA Invisible The new system will tell whether you're a bot or not without you having to figure out what's written in pictures So, what exactly happened? Well, Google, who bought reCAPTCHA years ago, introduced the Invisible reCAPTCHA. What does that mean? It means that you, as a regular Internet user, won't be bothered by it to tick checkboxes, decipher jumbled writing and so on. It will, however, still stand in the way of bots. " The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) was always rather simple to figure out. You had to type in a few mumbled words or tick a checkbox to prove you're not a robot. The newer version doesn't use any of these, however, because it works in the background to identify bots from humans. Google says the system uses a combination of "machine learning and advanced risk analysis that adapts to new and emerging threats." There are no more details and that's fine with us at this point because too much of those and bot-makers could learn how to crack it. Helping you help me reCAPTCHA was purchased by Google way back in 2009 and was put to use to protect websites from bots, but also to help Google. Google digitizes millions of books, but sometimes its text recognition system doesn't work too well. Then, it used areas of text its system couldn't understand and ask people to type in the words they saw. There was also the time when Google improved its Street View system with your help by asking you to tell it what numbers you saw in various pictures, which were, in fact, street and house numbers it captured with its cars. Next, the grid of pictures where Google asked you to pick all images showing traffic signs was used to train its computer image recognition algorithms. As sites switch to the new invisible CAPTCHA system, you will no longer even see the prompts to check boxes. If your system is flagged by Google as suspicious, well, you'll just have to go through the usual loops to get to where you want to go. Source
  19. Julian Assange said WikiLeaks will work with tech companies to resolve the CIA's exploits. Julian Assange, the founder of WikiLeaks, wants big players like Apple and Samsung to disarm the CIA's exploits before he releases them to the world. WikiLeaks wants to join forces with tech giants against the CIA. The leak-focused site on Tuesday released thousands of alleged CIA documents, accusing the intelligence agency of amassing tools that can break into iPhones, Android devices, smart TVs and cars. WikiLeaks' "Vault 7" release also indicated that the CIA hoarded vulnerabilities in iOS and Android and kept them secret so it could continue using them to gain access to devices. CNET is unable to verify whether the documents are real or have been altered. On Thursday, WikiLeaks founder Julian Assange said that his organization will work with tech giants like Apple, Google and Samsung to plug those holes before it releases more details on the CIA's hacking program. "We have quite a lot of exploits ... that we want to disarm before we think about publishing it," Assange said at a press conference streamed on Periscope. "We're going to work with some of these manufacturers to try and get these antidotes out there." His press conference was the latest turn in a drama that has potentially blown open how the CIA could use our own devices to spy on us. The documents show how the agency has allegedly been able to break into even encrypted devices such as phones and computers by taking control of their operating systems. Assange said he's been keeping WikiLeaks' findings under wraps while the CIA's exploits can still be used because he doesn't want them falling into the wrong hands. He said the CIA has already "lost control of its entire cyberweapons arsenal," which he criticized for being poorly secured. He said WikiLeaks has much more information on the CIA's cyberweapons program that it's waiting to reveal. "This is an historic act of devastating incompetence," Assange said, "to have created such an arsenal and stored it all in one place and not secured it." The CIA has not confirmed or denied the authenticity of WikiLeaks' release but did say that it is the CIA's job to "be innovative" and "cutting edge" with its technology. The intelligence agency said it will continue to spy on foreign countries to "protect America from terrorists, hostile nation states and other adversaries." The agency also sought to cast suspicion on the messenger. "As we've said previously, Julian Assange is not exactly a bastion of truth and integrity," CIA spokesman Jonathan Liu said Thursday in a statement. Challenges for Android and others For some of the smaller exploits, it will take companies two or three days to patch up the vulnerabilities, Assange said. For exploits on so-called internet of things devices like smart baby monitors or refrigerators, it could take much longer. Samsung said it is "urgently looking" into the CIA's alleged exploits after WikiLeaks named a program that could secretly turn its TVs into listening devices. Apple said it had already patched up most of the vunerabilities with its latest version of iOS. Microsoft said that it's aware of the CIA's alleged tools and that it's "looking into it." Google said in a statement that it had already patched up most of the holes. However, the various makers of Android devices add their own custom software, which may still be vulnerable. Android users will also have the most difficulty in getting fixes for some of the CIA's exploits because the operating system is used by multiple manufacturers with different rollout schedules for updates. "For some systems, like Android with many manufacturers, there is no automatic update to the system. That means that only people who are aware of it can fix it," Assange said. "Android is significantly more insecure than iOS, but both of them have significant problems." WikiLeaks is still sorting through thousands of documents for future releases. The organization redacted more than 78,000 IP addresses, more than a quarter of which came from the US. The CIA said it does not spy on US citizens, but WikiLeaks is still investigating how many of the 22,000 IP addresses in the US are from the CIA's hacking unit and how many are malware victims. Assange said the CIA's hacking programs cannot be properly regulated by its design. "The technology is designed to be unaccountable. It's designed to be untraceable," he said. Source
  20. VPN services have become an important tool to counter the growing threat of Internet surveillance. Encrypting one's traffic through a VPN connection helps to keep online communications private, but is your VPN truly anonymous? We take a look at the logging policies of dozens of top VPN providers. Millions of Internet users around the world use a VPN to protect their privacy online. Unfortunately, however, not all VPN services are as private as you might think. In fact, some are known to keep extensive logs that can easily identify specific users on their network. This is the main reason why we have launched a yearly VPN review, asking providers about their respective logging policies as well as other security and privacy aspects. This year’s questions are as follows: 1. Do you keep ANY logs which would allow you to match an IP-address and a time stamp to a user/users of your service? If so, what information do you hold and for how long? 2. What is the registered name of the company and under what jurisdiction(s) does it operate? 3. Do you use any external visitor tracking, email providers or support tools that hold information about your users/visitors? 4. In the event you receive a takedown notice (DMCA or other), how are these handled? 5. What steps are taken when a valid court order or subpoena requires your company to identify an active user of your service? Has this ever happened? 6. Is BitTorrent and other file-sharing traffic allowed (and treated equally to other traffic) on all servers? If not, why? 7. Which payment systems do you use and how are these linked to individual user accounts? 8. What is the most secure VPN connection and encryption algorithm you would recommend to your users? 9. How do you currently handle IPv6 connections and potential IPv6 leaks? Do you provide DNS leak protection and tools such as “kill switches” if a connection drops? 10. Do you offer a custom VPN application to your users? If so, for which platforms? 11. Do you have physical control over your VPN servers and network or are they hosted by/accessible to a third party? Do you use your own DNS servers? 12. What countries are your servers located in? — Below is the list of responses from the VPN services in their own words. Providers who didn’t answer our questions directly or failed by logging extensively were excluded. We specifically chose to leave room for detailed answers where needed. The order of the list holds no value. Continue reading Which VPN Services Keep You Anonymous in 2017?
  21. Mine is extremely light, but undoubtedly powerful. Here is my setup: Defensewall ShadowDefender Keyscrambler Sandboxie (custom rules) (A2, SAS, MBAM used rarely, on demand)
  22. In the wake of the recent Yahoo Cookies attack and the discussion at the RSA Conference, Stehphen Northcutt of SANS, made the following comment which I wanted to share since it is good security advice. When you are logging on to a web site and they say you can authenticate with your FaceBook or Yahoo, or Google or whatever account, don't do it. Have a unique login for every account and never link one to another. That will not solve everything, but it will reduce your risk. And I realize that people that do not work in security would not like to delete cookies, but as a security professional, try to default to no cookies on your main browser and the one you use to set airline reservations etc, that needs cookies, clean them out on a regular basis. Yes, it is a hassle because you have to log in again and yes, it reduces your attack surface area.
  23. This year’s RSA Conference in San Francisco brings the world’s security professionals together to discuss cybersecurity at a critical time. The past year has witnessed not just the growth of cybercrime, but a proliferation in cyberattacks that is both new and disconcerting. This has included not only cyber-attacks mounted for financial gain, but new nation-state attacks as well. As engineers and other employees across the tech sector meet in San Francisco, we need to ask ourselves what our response should be. We should start by acknowledging that no single step by itself will be sufficient to address this problem. Of course, each of our companies needs to continue to do more to protect and defend our customers around the world, and at Microsoft we’re focused on doing precisely that. So are others across the industry. But in addition, the time has arrived to call on the world’s governments to implement international rules to protect the civilian use of the internet. Just as the Fourth Geneva Convention has long protected civilians in times of war, we now need a Digital Geneva Convention that will commit governments to protecting civilians from nation-state attacks in times of peace. And just as the Fourth Geneva Convention recognized that the protection of civilians required the active involvement of the Red Cross, protection against nation-state cyberattacks requires the active assistance of technology companies. The tech sector plays a unique role as the internet’s first responders, and we therefore should commit ourselves to collective action that will make the internet a safer place, affirming a role as a neutral Digital Switzerland that assists customers everywhere and retains the world’s trust. A growing problem in need of new solutions The bad news starts with the fact that 74 percent of the world’s businesses expect to be hacked each year.[1] The estimated economic loss of cybercrime is estimated to reach $3 trillion by 2020. Yet as these costs continue to climb, the financial damage is overshadowed by new and broadening risks. Perhaps most disconcerting, recent years have witnessed the expansion of nation-state attacks. The Sony attack by North Korea in 2014 was not the first nation-state attack, but it represented a visible turning point. While prior attacks had focused on economic and military espionage, the Sony attack in 2014 involved retaliation for free expression in the form of a (not very popular) movie. It was followed in 2015 by even more visible international discussion about nation-state attacks aimed at the theft of companies’ intellectual property. And last year the issue broadened again to include hacking incidents connected to the democratic process itself. We suddenly find ourselves living in a world where nothing seems off limits to nation-state attacks. Conflicts between nations are no longer confined to the ground, sea and air, as cyberspace has become a potential new and global battleground. There are increasing risks of governments attempting to exploit or even weaponize software to achieve national security objectives, and governmental investments in cyber offense are continuing to grow. In fundamental ways, this new plane of battle is different from those of the past. It starts with the fact that cyberspace does not exist in a clearly tangible form in the physical world. But beyond this, cyberspace in fact is produced, operated, managed and secured by the private sector. Governments obviously play all sorts of critical roles, but the reality is that the targets in this new battle – from submarine cables to datacenters, servers, laptops and smartphones – in fact are private property owned by civilians. There’s an additional consequence that results from all this. The tech sector today operates as the first responders to nation-state attacks on the internet. A cyber-attack by one nation-state is met initially not by a response from another nation-state, but by private citizens. The situation has also worsened in one additional and important way. For two-thirds of a century, since 1949, the world’s nations have recognized through the Fourth Geneva Convention that they need to adhere to rules that protect civilians in times of war. But nation-state hacking has evolved into attacks on civilians in times of peace. This is not the world that the internet’s inventors envisioned 25 years ago. But it’s the world that we inhabit today. And as the private citizens thrust into this challenge, the question for all of us in the tech sector is what we will do to address it. Stronger individual tech sector responses Microsoft, like companies across the tech sector, is aggressively taking new steps to better protect and defend customers, including from nation-state attacks. This includes new security features at every level of the technology stack, reflecting the $1 billion that we’re spending annually in the security field. Email is currently at the heart of the cybersecurity battle, as an estimated 90 percent of all hacking begins with an email phishing attack. Reflecting this importance, last year we added Advanced Threat Protection for Microsoft Exchange Online. This identifies recognizable malware and suspicious code patterns in emails and stops them before they can do damage. We then added Office 365 Threat Intelligence to provide enterprises with information on the top targeted users, malware frequency and security recommendations related to their business. And last week we added new data governance features for Office 365 that include alerts that will be sent automatically to users when someone attempts to copy and download their inbox. We’ll be adding new features and offers in the coming months that provide additional protection. In many ways, however, security-related product features are just the start. Data analytics and machine learning have become game-changing defense mechanisms for detecting nation-state attacks. Microsoft’s datacenters are connected to over a billion computing end points and receive over a trillion data points every day. Advanced Threat Protection alone processes 6 billion emails each day. This provides the foundation for world-class early warning systems to detect cybersecurity attacks. Within Microsoft we’ve forged a unique, internal three-part partnership as part of the 3,500 security professionals from across the company. The Microsoft Threat Intelligence Center (MSTIC) is our reconnaissance arm, combing through the constant stream of data from our more than 200 cloud services and third-party feeds. Using machine learning, behavioral analysis and forensic techniques, this dedicated team creates a real-time picture – a security intelligence graph – of cyber activity related to advanced and persistent threats to Microsoft and our customers. When a threat is detected, MSTIC alerts our Cyber Defense Operations Center (CDOC), an “eyes on glass” command center staffed 24 hours a day, seven days a week by rotating teams of security and engineering professionals from across our product and services portfolio. This team of specialists serves as our frontline, taking immediate action against threats to defend our own systems and protect customers. As we identify threats, we’re not only working with customers, but using legal process, led by our Digital Crimes Unit (DCU), to respond in new and innovative ways that disrupt attacks, including those launched by nation states. Last year MSTIC identified an attack pattern that led to a group associated with a nation-state that had registered internet domains using names that included Microsoft and other companies’ trademarks. We went to federal court, obtained court orders and successfully sought appointment of a Special Master to oversee and expedite additional motions in our case. Working under this judicial supervision, we can notify internet registries whenever this group registers a fake Microsoft domain and request that control of that domain be transferred immediately to a sink-hole operated by DCU. Using this novel approach, we can disrupt the nation-state’s use of these domains within 24 hours. Since last summer, in response to extended nation-state attacks, we have taken down 60 domains in 49 countries spread over six continents. In each instance we stopped the flow of data to the hackers from any customers whose computers were hacked, we notified the customers of the nation-state attack and we helped them clean their environment and increase their security. Across the tech sector, companies are racing to provide stronger cybersecurity protection for customers, including from nation-states. Each of our advances is making an important contribution. But we’re nowhere close to being able to declare victory. Governments are increasing their investments in offensive cyber capabilities. We therefore need to recognize a critical truth – this is not a problem that we can solve solely with each of us acting alone. Calling on governments to do more The time has come to call on the world’s governments to come together, affirm international cybersecurity norms that have emerged in recent years, adopt new and binding rules and get to work implementing them. In short, the time has come for governments to adopt a Digital Geneva Convention to protect civilians on the internet. The foundation for new and international rules is now in place. Over the last two years there has been important progress in developing global cybersecurity norms. For example, in July 2015 governmental experts from 20 nations recommended cybersecurity norms for nation-states “aimed at promoting an open, secure, stable, accessible and peaceful ICT environment.”[2] These include key principles that bar governments from engaging in malicious activity using information and communications technology or similarly damaging other nations’ critical infrastructure. Importantly, leading governments have also proven that they can address these issues through direct and frank bilateral discussions. Following highly visible and even challenging negotiations, in September 2015 the U.S. and China agreed to important commitments pledging that neither country’s government would conduct or support cyber-enabled theft of intellectual property.[3] This paved the way for the Group of 20 to affirm the same principle more broadly at its meeting just two months later.[4] And additional inter-governmental discussions are continuing to progress further today. All of this points the way to potential new steps ahead. First, there is a new opportunity for vital bilateral action. Just as the United States and China overcame mutual challenges and made important progress in 2015 to ban intellectual property cyber-theft, the United States and Russia can hammer out a future agreement to ban the nation-state hacking of all the civilian aspects of our economic and political infrastructures. Second, governments around the world should pursue a broader multilateral agreement that affirms recent cybersecurity norms as global rules. Just as the world’s governments came together in 1949 to adopt the Fourth Geneva Convention to protect civilians in times of war, we need a Digital Geneva Convention that will commit governments to implement the norms that have been developed to protect civilians on the internet in times of peace. Such a convention should commit governments to avoiding cyber-attacks that target the private sector or critical infrastructure or the use of hacking to steal intellectual property. Similarly, it should require that governments assist private sector efforts to detect, contain, respond to and recover from these events, and should mandate that governments report vulnerabilities to vendors rather than stockpile, sell or exploit them. In addition, a Digital Geneva Convention needs to create an independent organization that spans the public and private sectors. Specifically, the world needs an independent organization that can investigate and share publicly the evidence that attributes nation-state attacks to specific countries. While there is no perfect analogy, the world needs an organization that can address cyber threats in a manner like the role played by the International Atomic Energy Agency in the field of nuclear non-proliferation. This organization should consist of technical experts from across governments, the private sector, academia and civil society with the capability to examine specific attacks and share the evidence showing that a given attack was by a specific nation-state. Only then will nation-states know that if they violate the rules, the world will learn about it. Building a trusted and neutral Digital Switzerland Finally, those of us in the tech sector need to act collectively to better protect the internet and customers everywhere from nation-state attacks. As the first responders to threats that in part target our own infrastructure, it’s important for global technology companies to adopt concrete commitments to help deter and respond to nation-state cyberattacks. As the Fourth Geneva Convention relies on the Red Cross to help protect civilians in wartime, protection against nation-state cyberattacks requires the active assistance of the tech sector. We need to start with a clear premise. Even in a world of growing nationalism, when it comes to cybersecurity the global tech sector needs to operate as a neutral Digital Switzerland. We will assist and protect customers everywhere. We will not aid in attacking customers anywhere. We need to retain the world’s trust. And every government regardless of its policies or politics needs a national and global IT infrastructure that it can trust. This commitment to 100 percent defense and zero percent offense has been fundamental to our approach as a company and an industry. And it needs to remain this way in the future. If we’re going to turn these words into effective action, we need to come together as an industry to adopt our own clear principles and to help put in place the steps needed to make these principles real. For example, we should commit ourselves to collaborative and proactive defense against nation-state attacks and to remediate the impact of such attacks. We should pledge that we’ll continue to take no efforts to assist in offensive actions anywhere. We should make software patches available to all our users, regardless of the attackers and their motives. We should adopt coordinated disclosure practices for the handling of product and service vulnerabilities. And we should work together to support international defensive efforts, like the new international organization described above.[5] There is strong progress on which we can build. For example, we at Microsoft have been collaborating with other leading cloud companies like Amazon and Google to combat cloud abuse such as spam and phishing sites. We’re working together on a common abuse reporting schema to accelerate the reporting of abuses we may see on each other’s networks. On issues such as customer notification of potential nation-state attacks, we’ve all learned from important work where Google and Facebook have been early and impressive leaders. More broadly, there is good work and common collaboration springing up everywhere, from new startups to the industry’s largest companies. Finally, as we consider these questions, it’s worth reflecting on at least one aspect of some of the other recent issues that have united the tech sector. The recent debates about immigration have brought to the surface an important truth. As an industry, the tech sector has literally brought the world together under its own roof. For example, at Microsoft in Washington state, a strong majority of our employees were born in the United States, but we also have employees who have come from 157 countries. I’ve long arrived at the office each morning feeling that I work at the United Nations of Information Technology. Our company is not unique. As an industry, we’ve brought people together in ways that can promote mutual understanding and respect. We need to harness this global understanding to protect people everywhere, earning their confidence as the world’s Digital Switzerland. Source
  24. SAN FRANCISCO—Google may have sent the tired castle analogy of network security’s soft center protected by a tough exterior out to pasture for good. On Tuesday at RSA Conference, Google shared the seven-year journey of its internal BeyondCorp rollout where it affirms trust based on what it knows about its users and devices connecting to its networks. And all of this is done at the expense—or lack thereof—of firewalls and traditional network security gear. Director of security Heather Adkins said the company’s security engineers had their Eureka moment seven years ago, envisioning a world without walls and daring to challenge the assumption that existing walls were working as advertised. “We acknowledged that we had to identify [users] because of their device, and had to move all authentication to the device,” Adkins said. Google, probably quicker than most enterprises, understood how mobility was going to change productivity and employee satisfaction. It also knew that connecting to corporate resources living behind the firewall via a VPN wasn’t a longterm solution, especially for those connecting on low-speed mobile networks where reliability quickly became an issue. The solution was to flip the problem on its head and treat every network as untrusted, and grant access to services based on what was known about users and their device. All access to services, Adkins said, must then be authenticated, authorized and on encrypted connections. “This was the mission six years ago, to work successfully from untrusted networks without the use of a VPN,” Adkins said. Implementing BeyondCorp required a new architecture, said Rory Ward, a site reliability engineering manager at Google, with a sharp focus on collecting quality data for analysis. The first step was to inventory users and their roles as their careers at Google progress, essentially re-inventing job hierarchies, and assessing how and why they need to access internal services. The same intimacy was needed with respect to device information, requiring construction of a similar inventory system that tracks all devices connecting to services through its lifecycle. For the time being, Ward said, this applies to managed devices only, though in the future he hopes to extend this capability to user-owned private devices. With that in place, Ward said Google engineers went to work building a dynamic trust repository that ingested data from more than two dozen data sources feeding it information about what devices were doing on the network. Policy files would describe how to define trust for a device and that would be done dynamically. “The trust definition of a device can go up or down dynamically depending on what was done and what the policy says,” Ward said. “We have complete knowledge of users, devices and an indication of trust of every device accessing Google systems.” Next, an access control engine was developed to enforce policy; it has the capability to ingest service requests along with user and device information and apply and enforce policy rules for accessing resources. For example, Ward said, to access source code systems, one would have to be a full-time Google employee in engineering and using a fully trusted desktop. This part of the rollout, Ward said, took two to three years to implement and brought Google closer to its goal of enabling access from anywhere. The final part of the rollout, Adkins and Ward said, was the implementation phase. While the project had executive support, there was a caveat: Don’t break anything or anybody. This was a tall order given Google’s tens of thousands of internal users and devices and 15 years of assertions about a privileged network. Ward said the expensive first step was to deploy an unprivileged and untrusted network in every one of Google’s approximately 200 buildings. Engineers grabbed samples of traffic from its trusted network and replayed it on the new untrusted network in order to analyze how workloads would behave. An agent was installed on every device in its inventory and every packet from those devices was also replayed on the new network to see what would fail as unqualified. This was a two-year process as well, and as it turned out, the project successfully chugged ahead to its full implementation. “We managed to move the vast majority of devices, tens of thousands of devices and users, onto the new network and did not manage to break anybody,” Ward said. Adkins said that earning executive support required making convincing arguments about this initiative making IT simpler, less expensive, more secure and employees happier and more productive. “Clear business objectives are compelling to executives,” Adkins said. “We went from location-based authentication and knowledge-based authentication that relies on quality data. Accurate data was the key to be able to make this thing work.” Article source
  25. Cerber Ransomware Switches To .CERBER3 Extension For Encrypted Files A new version of the Cerber Ransomware has been discovered by AVG security researcher Jakub Kroustek that switches from the .CERBER2 extension to .CERBER3 for encrypted files. When I tested this new sample, there was some minor outward differences between this version and the previous version. The most notable difference is that this new version will now append the .CERBER3 extension to encrypted files. This is shown in the sample pictures folder shown below. Encrypted Files Another notable difference is that this version has changed the ransom note names to # HELP DECRYPT #.html, # HELP DECRYPT #.txt, and # HELP DECRYPT #.url. The previous Cerber version had also sent UDP packets to the range of IP addresses. This version appears to be using the range for statistical purposes. As this version is further analyzed, more information may become available. When this happens, I will be sure to update this article. Source