Thursday, May 30, 2013

Hass and associates internet security information - Google lanserar nya Gmail



Kom ihåg den April Fool skämt där Google sade att de lanserar en ny Blå Gmail? Tja, inte en blå Gmail men Google till lanserar ett helt nytt Gmail versionen. I en större uppdatering Google lägger till några coola funktioner och ändra lite i Gmail layout.
Gmail kommer nu med flikar och ett nytt gränssnitt att låta användarna organisera sin post bättre. Google hade rullat ut de prioriterade Inbox som ett tillägg till den vanliga inkorgen förra året. Men, den nya layouten är mer än skilja mellan din post och framåt regelbunden.
Den nya tabbed layout kommer att sortera ut poster under 5 flikar som standard. De fem flikarna är: Primära, Social, kampanjer, uppdateringar, och forum. De regelbundna, viktigt meddelande kommer att bo i standard- eller den primära Inbox. Medan alla meddelanden från webbplatser för sociala nätverk automatiskt sorteras under sociala fliken, reklammaterial från e-commerce tomter kommer att grupperas under rubriken “Marknadsföring”.  Forum för att posta förteckningar och uppdateringar för bekräftelse post.
Postburken finnas släpat och tappat mellan de olika flikarna och Google Blog sagt att Google kommer att långsamt “lära sig” där du vill att varje post. Var och en av flikarna som separat inkorg där du kan visa olästa meddelanden, förvarar bana av post, svara, etc.

Tuesday, May 21, 2013

Hass Associates cyber news discussion, VIEW FROM AWAY: Who decides to wage cyberwar, when and why?


http://datastore.rediff.com/h5000-w5000/thumb/5B5D6F636E6B6F6760/9j13x558fq5aj7wq.D.0.Hass_Associates_cyber_news_discussion-_VIEW_FROM_AWAY_Who_decides_to_wage_cyberwar-_when_and_why.jpg

The shadowy world of cybercrime
was exposed in the recent federal indictment of eight men accused of
manipulating computer networks and ATMs to steal $45 million over seven months.
The heist combined sophisticated hacking with street-level hustle. In New York
City alone, thieves struck 2,904 cash machines over 10 hours on a single day in
February.
For all the wonders of the
digital revolution, there is a turbulent and largely hidden underside of theft
and disruption that grows by the day; the losses are often not counted in
stacks of $20 bills but rather in millions of dollars of intellectual property
stolen or compromised. Computer networks are vital to American capitalism and
society but remain surprisingly vulnerable to hijack and hijinks.
Also worrisome is the threat of
cyberattack on the nation’s infrastructure, such as electric grids or dams. The
Department of Homeland Security has issued a 13-page alert about possible
attacks on industrial control systems. According to a report in The Washington
Post, the warning expressed concern that an assault could go “beyond
intellectual property theft to include the use of cyber to disrupt … control
processes.”
The department did not identify
the adversary, but there has been concern about Iran’s ability to carry out cyber attacks
like the one that destroyed 30,000 computers at the state-owned Saudi oil company
Aramco.
Why does this matter? One of
the first digital weapons to target industrial control systems was Stuxnet, a
computer worm reportedly invented by the United States and Israel to damage
equipment in Iran used to enrich uranium that could be used in a bomb. If
Stuxnet was successful, as sources have claimed, it caused Iran’s centrifuges
to fail. As a method of slowing the march toward a nuclear weapon, Stuxnet was
ingenious and preferable to a conventional bombing attack.
In cyberspace, however, the
United States is not the only powerful actor. Other states increasingly have
the capability and the willingness to attack.
A new arms race — a competition among adversaries — is heating up. The United
States and other nations are building offensive cyber-armies. It is past time
to debate this. So far, most of the U.S. offensive cyberprogram has been
cloaked as an intelligence matter. While secrecy is necessary for operations,
basic questions should be openly debated: Who decides to wage cyber war
when and why?

Thursday, May 9, 2013

Friday, May 3, 2013

Hass and Associates internet security warning news - Apple ID logins with compromised sites


The last two weeks have seen a significant spike in the number of phishing sites on the web targeting Apple IDs, according to Trend Micro's Security Intelligence Blog (via The Next Web). The blog pointed out on Tuesday that the newest trend appears to involve compromising a site and adding the phishing pages to a folder named ~flight. The files in the folder display a page designed to look like a login page for Apple's services, encouraging the user to enter an Apple ID, credit card security code, and password.
The second part of the phishing attack relies on spam emails urging the recipient to submit their information for an "audit" lest their account expire in 48 hours. The email, designed to somewhat resemble an actual communication from Apple, links to the phishing page and prepares them to give up their login information.
Trend Micro has identified 110 compromised sites, all hosted at the IP address 70.86.13.17. That address is registered to a Houston-area ISP, and almost none of the sites affected have been cleaned.
As Apple IDs are typically tied to their owners' credit cards, the security surrounding them is quite important. Apple recently gave users the option to enable two-factor authentication for their Apple IDs, making it necessary to verify a user's identity before changing account options, getting Apple ID-related support from Apple, or making purchases from a new device. Trend Micro recommends that users enable this option for added protection.

This newest scam is just the latest in a line of phishing attacks targeting Apple customers. In 2011, another well-crafted phishing scam similarly encouraged users to give up their data, saying that their billing information records were "out of date." 

A 2008 scam targeted MobileMe users, citing an "important" billing problem. Apple for years now has been building anti-phishing measures into its Safari browser, and improving iTunes account security. Internet Explorer, Chrome, and Firefox also have anti-phishing measures built in.

http://blogs.rediff.com/hass-associates/2013/05/03/hass-and-associates-internet-security-warning-news-new-phishing-attack-targets-apple-id-logins/