Spyware, Viruses, & Security forum

General discussion

NEWS - November 9, 2009

"Play.com emails customer details to other customers"

No explanation yet from data-spraying vendor

John Oates
November 9, 2009

Online DVD and CD seller Play.com has sent out dozens of emails containing customer account details to the wrong customers.

We were contacted by Reg reader Ben, who had received an order confirmation email for a customer called Kate. This included the title of the CD she had ordered - The Killers' "Live at the Royal Albert Hall" if you must know - as well as her email address, delivery address and payment method, but no other financial details. In total, Ben got 24 messages with order confirmations for different customers.

When he contacted Play.com, it said it had received a lot of complaints and its IT department was trying to discover what had gone wrong. Three days later and it seems it is still looking for an answer.

Continued here: http://www.theregister.co.uk/2009/11/09/play_email_data_problems/

Discussion is locked
You are posting a reply to: NEWS - November 9, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: NEWS - November 9, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Illegal copies of Microsoft Cofee spills onto the web

In reply to: NEWS - November 9, 2009

Microsoft software that is designed to help the police access encrypted data is loose on the web.

Author: Karl Flinders
Posted: 09 Nov 2009

The software, known as Computer Online Forensic Evidence Extractor (Cofee), has been put on file-sharing site, according to reports on the web. It is illegal for unauthorised people to use the software or download it.

The software helps law enforcement agencies access details about crimes before criminals can wipe the information.

"Cofee brings together a number of common digital forensics capabilities into a fast, easy-to-use, automated tool for first responders. And Cofee is being provided [free] to law enforcement around the world," said Microsoft.

Police officers with basic computer skills can be taught to use the software in less than 10 minutes. "This enables the officer to take advantage of the same common digital forensics tools used by experts to gather important volatile evidence, while doing little more than simply inserting a USB device into the computer," said Microsoft.

Continued here: http://www.computerweekly.com/Articles/2009/11/09/238474/illegal-copies-of-microsoft-cofee-spills-onto-the-web.htm
Collapse -
Worm author tells media he initially infected 100 iPhones

In reply to: NEWS - November 9, 2009

Graham Cluley
November 9th, 2009

The author of the world's first iPhone worm appears to be feeling pretty cocky about the whole incident.

Without a hint of apology, or the slightest acknowledgement that he may have done something wrong, Ashley Towns has been speaking to the media who have contacted him via his Twitter account.

Towns, who goes by the online handle of "ikex", spread the ikee worm which broke into jailbroken iPhones and installed a picture of Rick Astley before hunting for other vulnerable devices. In an interview with ABC News, the 21-year-old student was asked if he knew how many iPhones had been affected:

"Due to the nature of it, it's kind of hard to tell, I know my phone hit about 100 alone but from there I have no idea," he said.

So, it appears that Ashley Towns is admitting that he personally infected 100 iPhones from his own iPhone. Those iPhones would then have tried to infect other jailbroken iPhones, and so on, and so on..

Continued here: http://www.sophos.com/blogs/gc/g/2009/11/09/worm-author-tells-media-initially-infected-100-iphones/

Collapse -
AP IMPACT: Framed for child porn ? by a PC virus

In reply to: NEWS - November 9, 2009

By JORDAN ROBERTSON
Mon Nov 9, 2009

Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography.

Heinous pictures and videos can be deposited on computers by viruses ? the malicious programs better known for swiping your credit card numbers. In this twist, it's your reputation that's stolen.

Pedophiles can exploit virus-infected PCs to remotely store and view their stash without fear they'll get caught. Pranksters or someone trying to frame you can tap viruses to make it appear that you surf illegal Web sites.

Whatever the motivation, you get child porn on your computer ? and might not realize it until police knock at your door.

An Associated Press investigation found cases in which innocent people have been branded as pedophiles after their co-workers or loved ones stumbled upon child porn placed on a PC through a virus. It can cost victims hundreds of thousands of dollars to prove their innocence.

Continued here: http://tech.yahoo.com/news/ap/20091109/ap_on_hi_te/us_tec_a_virus_framed_me

Collapse -
Koobface Abuses Google Reader Pages

In reply to: NEWS - November 9, 2009

We are seeing another development from the Koobface botnet, this time abusing the Google-owned service Google Reader to spam malicious URLs in social networking sites such as Facebook, MySpace, and Twitter.

The Koobface gang used controlled Google Reader accounts to host URLs containing an image that resembles a flash movie. These URL are spammed through the said social networks. When the user clicks the image or the title of the shared content, it leads to the all too familiar fake YouTube page that hosts the Koobface downloader component.

[Figure 1 - The Google Reader page where the Koobface-related file is hosted. Figure 2 - Usual Koobface page]

Google Reader is a free service offered by Google that allows users to monitor websites for new content. It also allows the users to share content from the websites. Any user online can view these pages as they are shared into the public. Sharing any Google Reader page publicly is easy as anyone can click on the share icon in his or her Reader page and the content will appear on the his or her public page.

Continued here: http://blog.trendmicro.com/koobface-abuses-google-reader-pages/

Collapse -
Twitter Start-Up CoTweet Launches Paid Service

In reply to: NEWS - November 9, 2009

By Andrew LaVallee

CoTweet, a start-up that helps businesses manage their Twitter accounts, is rolling out its first fee-based services, with McDonald?s, Ford and SunTrust among its paying customers.

The San Francisco company said over the summer, when it announced $1.1 million in funding, that it would eventually charge for some offerings. Its new enterprise program starts at $1,500 a month, said Jesse Engle, CoTweet?s chief executive.

In exchange, customers get the ability to store data about their interactions with other Twitter users, including tweets, retweets, replies and direct messages, for as long as they?re an active client. The free version of CoTweet, in contrast, stores conversational data for 14 days, he said.

Enterprise-program customers also get analytics tools that show the reach of their Twitter activities (for example, how often their tweets get retweeted), types of inquiries they receive and average response time. This kind of information is increasingly important for companies getting involved in the messaging service, Mr. Engle said.

Continued here: http://blogs.wsj.com/digits/2009/11/09/twitter-start-up-cotweet-launches-paid-service/

Collapse -
Softpedia's exclusive interview with Malwarebytes

In reply to: NEWS - November 9, 2009

Softpedia's exclusive interview with Malwarebytes: Malwarebytes Accuses, IObit Plays Dead

Malwarebytes burst the bubble this week and came out accusing IObit of copying their database, thus providing through their IObit Security 360 product the same protection as Malwarebytes' Anti-Malware. The copyright infringement implications led to DMCA serving of the latter to a number of software download websites in US.

Both security vendors have engaged in a war of statements on their respective blogs, stirring up heated discussions among users on their forums. Speculations have been made, opinions expressed, but no official answer to clear all haze has been given. We tried to learn about the sparks that lit the scandal and the elements fueling it.

Before we begin, we'd like to note that, in order to be fair and give everyone involved a chance to express their point of view, we also sent a set of questions to IObit for a similar interview. We have received a short response from one of the company's representatives, making it clear that the vendor had more important software development-related tasks on hand than to continue responding to Malwarebytes' accusations.

From the reply we got, we conclude that IObit's position regarding this issue remains unchanged. The company describes Malwarebytes' claims as mere rumors and its actions as unwarranted attacks.

On the matter of other antivirus vendors possibly making similar accusations in the future as a result of this incident, the IObit spokesperson stressed that the company did not steal signatures from anyone and noted that everyone was encouraged to test their database.

Continue reading in http://news.softpedia.com/news/Malwarebytes-Accuses-IObit-Plays-Dead-126389.shtml
Collapse -
Nastygram: MySpace Phish Plants Spy Software

In reply to: NEWS - November 9, 2009

A new spam campaign targeting MySpace.com users once again illustrates the blended threat from junk e-mail attacks, experts warn. This latest run tries to lure recipients into giving up their MySpace credentials, and then attempts to trick victims into installing password-stealing malicious software.

Attackers began blasting out the junk e-mails early Monday, according to researchers at the University of Alabama, Birmingham, Researchers at the school so far have tracked more than 30 Web site names associated with this attack, each beginning with "accounts.myspace.com" and ending in a United Kingdom country code domain (.uk).

The campaign is nearly identical to one launched late last month targeting Facebook.com users, said Gary Warner, director of research in computer forensics at UAB Birmingham: Recipients are directed to a fake Myspace.com page and asked for their login credentials. That attack cycled through at least 242 different look-alike Facebook scam sites before the last was shut down about five days later.

Continued here: http://voices.washingtonpost.com/securityfix/

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Zeus Malware Moves to Myspace

Beginning about 90 minutes ago, the Zeus malware, also known as Zbot, began a new spam distribution campaign to infect more victims. The newest campaign follows the model of last week's Facebook UpdateTool, only now targeting MySpace users.

This update is pretty much in "Breaking News" mode at the moment, we haven't yet run the malware through the lab for a full analysis, but here's what we can tell you so far:

1. There are 30 recently created domains being used as targets in the spam messages. Here are the host names we've seen so far in spam messages:

See the (30) domains, subject lines and text here: http://garwarner.blogspot.com/2009/11/zeus-malware-moves-to-myspace.html

Collapse -
Microsoft to launch Forefront Protection 2010

In reply to: NEWS - November 9, 2009

Elinor Mills
November 9, 2009

Microsoft is set to launch its new Forefront Protection 2010 antimalware for Exchange on Monday.
The company also will announce at the TechEd Europe conference in Berlin the availability of Forefront Online Protection for Exchange designed for enterprise customers who want Microsoft to host the security solution.

The announcements are being made in conjunction with the scheduled launch this week of Exchange 2010, the new version of Microsoft's e-mail and communications server.

Meanwhile, Microsoft said last month it was delaying the release of its Forefront Endpoint Protection 2010 for Windows desktops until the second half of next year.

Continued here: http://news.cnet.com/8301-27080_3-10392756-245.html

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

DEALS, DEALS, DEALS!

Best Black Friday Deals

CNET editors are busy culling the list and highlighting what we think are the best deals out there this holiday season.