Malicious Software Poses as Video from a Facebook Friend

A piece of malicious software masquerading as a Facebook video is hijacking users’ Facebook accounts and Web browsers, according to independent Italian security researchers who have been investigating the situation.

The malware appears as a link in an e-mail or Facebook message telling people that they have been tagged in a Facebook post. When users go to Facebook and click the link, they are sent to a separate Web site and prompted to download a browser extension or plug-in to watch a video, said one of the researchers, Carlo De Micheli, in a telephone interview on Monday.

Once that plug-in is downloaded, the attackers can access everything stored in the browser, including accounts with saved passwords. Many people commonly save e-mail, Facebook and Twitter login data in their browsers, so the attackers can masquerade as the victim and tap those accounts.

Mr. De Micheli said the malicious software has been spreading at a rate of about 40,000 attacks an hour and has so far affected more than 800,000 people using Google’s popular Chrome browser. It is replicating itself primarily by hijacking victims’ Facebook accounts and reaching out to their friends on the social network. A user hit by the malicious software cannot easily remove it, since it blocks access to the browser settings that allow it to be removed and also blocks access to many sites that offer virus removal software.

A spokeswoman for Google, which makes the Chrome browser, said the company was aware of the attack and has already disabled the browser extensions that allowed it.

“When we detect items containing malware or learn of them through reports, we remove them from the Chrome Web Store and from active Chrome instances,” said the spokeswoman, Veronica Navarrete, in a statement. “We’ve already removed several of these extensions, and are continuing to improve our automated systems to help detect them even faster.”

Facebook said that its security systems had also detected the attack and it was working to clear the malicious links.

“In the meantime, we have been blocking people from clicking through the links and have reported the bad browser extensions to the appropriate parties,”  Michael Kirkland, a Facebook spokesman, said in a statement. “We believe only a small percentage of our users were affected by this issue, and we are currently working with them to ensure that they’ve removed the bad browser extension.”

However, Mr. De Micheli said the attackers, who appear to be of Turkish origin based on comments embedded in the software, were adapting the malicious code and had already found a way to target users of Firefox, another popular browser.

This is not the first instance of an attack through a browser extension, which is a bit of software that allows a Web browser to perform specific functions, much like an app does for a smartphone. But this attack appears to be one of the most extensive to use the technology.

“A few years ago, you’d tell your friends, don’t click on attachments,” Mr. De Micheli said. Now, the same advice applies to browser add-ons, he said.

Mr. De Micheli said that browser makers should do a better job of warning users that installing a plug-in, like installing a smartphone app, can give the software access to a wide variety of personal information. “People are used to clicking ‘accept,’” he said.

Mr. De Micheli is an independent security researcher who, along with several other Italian colleagues, has done extensive work tracking unseemly activity on social networks, including the underground market in fake Twitter followers. In the case of the malicious browser extensions, he is working with Andrea Stroppa, Danny di Stefano and Matt Hofman.

Justin O’Kelly, a spokesman for Mozilla, said that users should make sure that they are only installing legitimate software from well-known Web sites that they trust. “Users should be wary of scams or suspicious messages asking them to install software from an unknown site,” he said in a statement.

 

source: http://bits.blogs.nytimes.com/2013/08/26/malicious-software-poses-as-video-from-a-facebook-friend/?ref=technology&_r=0

Know……Cloud Antivirus

Unlike traditional antivirus software, cloud antivirus refers to the type of antivirus that runs on the cloud(remote server). Cloud Antivirus will scan all your files through the internet and run the tests on their own server, in this way it won’t disrupt any of your computer activity nor will it slow down your computer. Another benefit of cloud antivirus is that instead of having to update traditional antivirus software routinely, it automatically updates the virus definitions in the cloud. Cloud antivirus software consists of client and Web service components working together. The client is a small program running on your local computer, which scans the system for malware Cloud antivirus is usually combined with other malware detection techniques, which are found in traditional anti-virus products. These approaches may include identifying malware based on suspicious heuristic or behavioral characteristics. Some examples of cloud anti-virus products are Panda Cloud Antivirus and Immunet.

Some Technology Facts, Did U Know???

160 billion emails are sent daily, 97% of which are spam.

Spam generates 33bn KWt-hours of energy every year, enough to power 2.4 million homes, producing 17 million tons of CO2.

9 out of every 1,000 computers are infected with spam.

Spammer get 1 response to every 12 million emails they send (yet it still makes them a small profit).

A twillionaire is a twitterer with a million or more followers.

There are some 1 billion computers in use.

There are some 2 billion TV sets in use.

There are more than 4 billion cell phones in use. About 3 million cell phones are sold every day.

The first known cell phone virus, Cabir.A, appeared in 2004.

Since 2008, video games have outsold movie DVDs.

Amazon sells more e-books than printed books.

Facebook has 500 million registered users… about 100 million less than QQ.

About 1.8 billion people connect to the Internet, 450 million of them speak English.

Google indexed it’s 1 trillionth unique URL on July 25, 2008. That is thought to be about 20% of all the pages on the Internet but a high percentage of the World Wide Web (the public Internet).

One google search produces about 0.2g of CO2. But since you hardly get an answer from one search, a typical search session produces about the same amount of CO2 as does boiling a kettle.

Google handles about 1 billion search queries per day, releasing some 200 tons of CO2 per day.

The average US household uses 10.6 megawatt-hours (MWh) electricity per year.

Google uses an estimated 15 billion kWh of electricity per year, more than most countries. However, google generates a lot of their own power with their solar panels.

The first public cell phone call was made on April 3, 1973 by Martin Cooper.

The Motorola DynaTAC 8000X was the first cell phone sold in the US; launched on April 11, 1984, it was designed by Rudy Krolopp and weighed 2 pounds.

About 20% of the videos on YouTube are music related.

24 hours of video viewing is uploaded every minute on YouTube.

People view 15 billion videos online every month.

On average, US onliners view 100 videos per month each.

Flickr hosts some 5 billion photographs, Facebook hosts more than 15 billion.

1 Bit = Binary Digit
8 Bits = 1 Byte
1000 Bytes = 1 Kilobyte
1000 Kilobytes = 1 Megabyte
1000 Megabytes = 1 Gigabyte
1000 Gigabytes = 1 Terabyte
1000 Terabytes = 1 Petabyte
1000 Petabytes = 1 Exabyte
1000 Exabytes = 1 Zettabyte
1000 Zettabytes = 1 Yottabyte
1000 Yottabytes = 1 Brontobyte
1000 Brontobytes = 1 Geopbyte
Technically speaking, the sum is 1024 bytes.

source:  Technology fast facts

Offline DotNet 3.5 Installation in Windows 8 Developer Preview

If you are using Windows Developer Preview and trying to install any of DotNet enabled application, it doesn’t gives to install since DotNet Framework 3.5 is not being installed in your system. It required Internet Connection to download DotNet Framework Online.

windows feature

But even if you haven’t internet connection, you can install it from the DVD of Windows Developer Preview.

Place your DVD or USB drive in the computer

Open Command Prompt as Administrator

Run the below mentioned command:

dism.exe /online /enable-feature /featurename:NetFX3 /Source:Z:\sources\sxs where “Z” is the DVD drive or USB

Its very easy process. Just try it.

Advanced Windows Search

If you want to filter on a property that doesn’t appear when you click in the search box, you can use special keywords. This typically involves typing a property name followed by a colon, sometimes an operator, and then a value. The keywords aren’t case sensitive.

Example search term

Use this to find

System.FileName:~<“books” – Files whose names begin with “books.” The ~< means “begins with.”

System.FileName:=”monthly report” – Files named “monthly report.” The = means “matches exactly.”

System.FileName:~=”pro”  – Files whose names contain the word “pro” or the characters pro as part of another word (such as “process” or “procedure”). The ~= means “contains.”

System.Kind:<>picture  – Files that aren’t pictures. The <> means “is not.”

System.DateModified:05/25/2010  – Files that were modified on that date. You can also type “System.DateModified:2010” to find files changed at any time during that year.

System.Author:~!”herb”  – Files whose authors don’t have “herb” in their name. The ~! means “doesn’t contain.”

System.Keywords:”sunset”  – Files that are tagged with the word sunset.

System.Size:<1mb  – Files that are less than 1 MB in size.

System.Size:>1mb  – Files that are more than 1 MB in size.

Windows 7 Best Short-cuts

Now enrich with your windows 7 and feel great to help with the short-cuts ….

1. Win+h – Move current window to full screen.

2. Win+i – Restore current full screen window to normal size or minimize current window if not full screen.

3. Win+Shift+arrow – Move current window to alternate screen.

4. Win+D – Minimize all windows and show the desktop.

5. Win+E – Launch Explorer with Computer as the focus.

6. Win+F – Launch a search window.

7. Win+G – Cycle through gadgets.

8. Win+L – Lock the desktop.

9. Win+M – Minimize the current window.

10. Win+R – Open the Run window.

11. Win+T – Cycle through task bar opening Aero Peek for each running item.

12. Win+U – Open the Ease of Use center.

13. Win+Space – Aero Peek the desktop.

14. Ctrl+Win+Tab – Open persistent task selection window, roll mouse over each icon to preview item and minimize others.

Firefox short-cut keys

If you have shortcuts to solve your problems then why using tedious methods
try these 30 shortcut keys

Spacebar — Page down one full screen at a time
Shift – Spacebar — Page up one full screen at a time
Down Arrow – Scroll down
Page Down — Page down one full screen at a time
Up Arrow – Scroll Up
Page Up — Page up one full screen at a time
End – Go to the Bottom (end) of the page
Home – Go to the Top of page
F5 — Reload the current page
Alt + Home — Go to home page
Ctrl + L — Go to the Address bar
Ctrl + K — Go to the search box
Ctrl + = — Increase the text size, zoom in
Ctrl + – — Decrease the text size, zoom out
Ctrl + P — Print the current page
Ctrl + H — Opens the Browsing History in a column on the left
Ctrl + T — Open a new tab
Ctrl + W — Close current tab
Ctrl + Tab — rotate forward to the next tab
Ctrl + Shft + Tab — rotate back to the previous tab
Ctrl + 1-9 — Choose a number to jump to that specific tab
Ctrl + B — Open Bookmarks Column on Left
Ctrl + I — Close Bookmarks Column
Ctrl + D – Create a bookmark for the current page
Shift – scroll down – Go to the previous page
Shift – scroll up – Go to the next page
Ctrl – scroll up — Decrease the text size, zoom out
Ctrl – scroll down — Increase text size, zoom in
Middle click on link — Open the link in a new tab
Middle click on a tab — Close the tab